CN114726621A - Method and system for end-user initiated access server plausibility check - Google Patents
Method and system for end-user initiated access server plausibility check Download PDFInfo
- Publication number
- CN114726621A CN114726621A CN202210366031.3A CN202210366031A CN114726621A CN 114726621 A CN114726621 A CN 114726621A CN 202210366031 A CN202210366031 A CN 202210366031A CN 114726621 A CN114726621 A CN 114726621A
- Authority
- CN
- China
- Prior art keywords
- user
- access
- information
- management system
- access management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 106
- 230000004044 response Effects 0.000 claims description 58
- 230000015654 memory Effects 0.000 claims description 36
- 238000012795 verification Methods 0.000 claims description 35
- 238000012790 confirmation Methods 0.000 claims description 11
- 238000010200 validation analysis Methods 0.000 claims description 5
- 238000007726 management method Methods 0.000 description 266
- 238000004891 communication Methods 0.000 description 82
- 230000008569 process Effects 0.000 description 64
- 238000012545 processing Methods 0.000 description 44
- 230000002452 interceptive effect Effects 0.000 description 23
- 238000010586 diagram Methods 0.000 description 21
- 230000006870 function Effects 0.000 description 9
- 238000013475 authorization Methods 0.000 description 8
- 239000003795 chemical substances by application Substances 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 230000000977 initiatory effect Effects 0.000 description 8
- 238000012544 monitoring process Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000008520 organization Effects 0.000 description 5
- 230000002093 peripheral effect Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 3
- 235000014510 cooky Nutrition 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000699666 Mus <mouse, genus> Species 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000002591 computed tomography Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002059 diagnostic imaging Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- -1 iOS Chemical class 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000002595 magnetic resonance imaging Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000003325 tomography Methods 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present disclosure relates to a method and system for end-user initiated access server plausibility checking. Techniques are disclosed for enabling a user to verify the authenticity of a computing system (e.g., an access management system), such as a computing system that controls access to one or more resources. The user may determine the authenticity of the access management system before the user provides credential information to the access management system. An interface may be presented to the user at the client system requesting authentication of the access management system. The access management system may provide the user with temporary access information at the client system for submission back to the access management system. The access management system may provide the most recent personal information to the user at the client system to verify the access management system. After verifying the personal information, the access management system may prompt the user for credential information to establish the session.
Description
The present application is a divisional application of the invention patent application having application number 201680061463.6 entitled "method and system for end-user initiated access server plausibility check", filed on 31/3/2016.
Cross Reference to Related Applications
This application claims the benefit and priority of U.S. non-provisional patent application No.14/920,807 entitled "END USER INITIATED ACCESS SERVER authentication CHECK" filed on 22/10/2015, the entire contents of which are incorporated herein by reference for all purposes.
Technical Field
This application relates generally to data processing. More particularly, the present application relates to techniques for enabling a user to verify the authenticity of a computing system controlling access to resources.
Background
Modern enterprises rely on a variety of applications and systems to control and generate information critical to business operations. Different applications often provide different services and information, and different users may need to access different levels of information within each system or application. The level of access granted to a user may depend on the user's role. For example, a manager may need to access certain information about employees who report to it, but it may not be appropriate to have that manager access the same information about people who report to it.
Previously, less complex applications incorporated access management business logic directly into the application code. That is, for example, each application would require the user to have a separate account, separate policy logic, and separate permissions. Furthermore, when a user authenticates through one of these applications, such authentication remains unknown to the other applications in the enterprise because the fact that authentication with the first application has occurred is not shared. Thus, there is no concept of trust between applications that use different systems for authentication and access control. Engineers are quickly aware that setting up an access management system for each application in an enterprise is as if each vehicle were equipped with a gas station, and it is determined that authentication and access control will be more efficiently implemented and managed as a shared resource. These shared resources are referred to as access management systems.
Access management systems often use policies and other business logic to determine whether a particular access request should be granted to a particular resource. After determining that access should be granted, the token is provided to the requestor. This token, like a key, can be used to open a door that protects restricted data. For example, a user may attempt to access a human resources database to gather information about certain employees) such as payroll information). The user's web browser issues a request to the application, which requires authentication. If the web browser does not have a token, the user is required to log in to the access management system. When the user is authenticated, the user's browser receives a cookie representing a token that is available to access the human resources application.
In an enterprise, a user (e.g., an employee) typically has access to one or more different systems and applications. Each of these systems and applications may utilize different access control policies and require different credentials (e.g., username and password). Single sign-on (SSO) can provide a user with access to multiple systems and applications after an initial login. For example, when a user logs into their work computer, the user may also access one or more other resources (such as systems and applications). The access management system may challenge the user to verify his/her identity to determine access to the resource. The user can be challenged with information based on a combination of "what you have", "what you know", and "who you are".
The access management system may utilize a graphical user interface on the client device to prompt the user to query the user for information to verify the user's credentials. Sometimes, the information requested by the user may include sensitive confidential information that, if included, may threaten the identity of the individual and the individual's information (e.g., financial information or account information). Thus, a user may hesitate to provide sensitive information to a system (such as a server) to gain access to resources without being sure whether the system requesting the information does indeed control access to those resources.
With the continuing technology-based advances in identity theft using technologies such as fraud and phishing, users are even more reluctant to provide their credentials without being able to verify the source of the credential request. For example, the access management system may provide private information to the user to let the user determine the authenticity of the access management system based on the private information. However, in such scenarios, fraudulent and phishing systems may have access to personal information that may be used to entice users to consider the system requesting authentication to be legitimate. In another example, the access management system may contact another device with a special code to perform additional checks. However, the fraud system may access the user's contact information and may use this information to send additional verification information. In yet another example, a phishing or fraud system may attempt to fraud the user by acquiring credential information through a collection page that is not controlled by the access management system. In one scenario, on a client system, a malicious browser plug-in may be activated to act as an access management system to erroneously request access credentials from a user.
In some cases, the client system may receive a one-time code (e.g., a password) to enable a user operating the client system to access the resource via the access management system. The client system, if compromised or stolen, may enable a user operating the client system to gain unauthorized access to the resource using the one-time code. Some techniques for identity theft may be used to intercept communications between a client system operated by a user and an access management system. The intercepted communication may be used to solicit identity or access information from the user.
Access management solutions may face the challenge of providing users with the ability to enable the user to initiate authentication of a system providing access management facilities. New techniques are desired to enable users to determine the authenticity of the system requesting credential information to access a resource.
Disclosure of Invention
The present disclosure relates generally to managing access to resources. Certain techniques are disclosed for enabling a user to verify the authenticity of a computing system (e.g., an access management system), such as a computing system that controls access to one or more resources. Specifically, techniques are disclosed for enabling a user to determine the authenticity of an access management system before the user provides credential information to the access management system.
Embodiments disclosed herein enable a user to use information to verify the authenticity of an access management system. The information may be different each time and the user can use this up-to-date information to verify the authenticity of the access server. The data exchange between the access management system and the client system may be modeled as a three-way handshake between the end user and the access management system. Thus, the access management system need not reveal any confidential information unless the user certifies himself with the temporary data. The technology described herein prevents the security risks exposed by using stolen cards or mobile devices by asking the user for temporary data ("what you have") and passwords ("what you know"). The three-way handshake ensures that the authentication is perfectly flawless from the end-user and from the point of view of the access server side.
In some embodiments, the user may be presented with an interface, such as a Graphical User Interface (GUI), at the client system that enables the user to request authentication of the access management system. The interface may be presented prior to requesting credential information from a user to access a resource controlled by the access management system. By verifying the authenticity of the access management system, it may be ensured that the user does not provide credential information to computing systems controlled by unauthorized users. By enabling the user to verify the authenticity of the access management system, the user can ensure that the credential information and other confidential information is not compromised by unauthorized parties or entities. It can also be ensured that the user access management system itself is not destroyed, so that when the credentials are provisioned, the recipients of these credentials can gain unauthorized access to the desired resource.
In one aspect of the invention, the interface requesting system verification may require identification information of the user to initiate system verification. The identification information may enable the access management system to identify the user to determine contact information for communicating the authentication information. The contact information may correspond to one or more destinations (e.g., email addresses or different devices) with which the access management system may communicate as part of system authentication.
During system verification, the access management system may send temporary data (e.g., temporary access information) subject to one or more criteria, such as time. The temporary access information may be sent to the client system requesting system authentication and/or any destination associated with the user. The access management system may request temporary access information via the interface as part of a system authentication process. The access management system may check the temporary data to determine if it matches the data sent to the user.
After verifying that the temporary data matches data previously sent to the user, the access management system may send personal information to the user as part of system authentication. The personal information may include sensitive confidential information (e.g., current financial information) that may not be known to the unauthorized user. The personal information may be sent to a client system and/or destination(s) associated with the user. Through the interface, the user can indicate whether the personal information is correct. The confidential information may be information that is known only to the user and the access management system. The confidential information may include information that is unlikely, if not impossible, to be fraudulently intercepted, guessed or otherwise obtained by other external computer systems.
Through the interface, the user may provide credential information when verifying personal information. The credential information may be used to determine authentication of the user as part of a system verification process. After successfully authenticating the user based on the credentials, the access management system may establish a session for the user to enable access to the resource.
In some embodiments, the access management system may comprise a computing system configured to implement the methods and operations described herein. Still other embodiments relate to systems and machine-readable tangible storage media that employ or store instructions for the methods and operations described herein.
In at least one embodiment, a method may include receiving a validation request from a computing device operated by a user to authenticate an access management system, the validation request including user identification information associated with the user. The method may include sending temporary access information for the user authenticated access management system to a destination associated with the user based on the user identification information. The destination may be a computing device. The destination may be a device associated with the user. The device may be different from the computing device. The method may include receiving a first response including temporary access information from the computing device. The method may include, after verifying the temporary access information received in the first response, sending, by the computing system to the computing device, personal information about the user. The method may include receiving a second response from the computing device, the second response indicating confirmation of the personal information by the user, and the second response including credential data for the user. The method may include determining an authentication of a user to access a resource from a computing device. The authentication may be determined based on the confirmation of the credential data and the personal information received in the second response.
In some embodiments, the method may include, after determining that the user is not authenticated to access the resource from the computing device, sending a request to the computing device for credential information of the user. The computing device may send an authentication request in response to a request for credential information.
In some embodiments, a first response may be received from the destination.
In some embodiments, the method may include determining that user identification information is associated with a user; and identifies the destination based on the user identification information.
In some embodiments, the temporary access information is associated with a time period. Verifying the temporary access information may include determining that the response time is within the time period. The response time may be based on a time for receiving the first response after the temporary access information is sent to the computing device.
In some embodiments, the method may include generating the personal information prior to sending the personal information after verifying the temporary access information received in the first response.
In some embodiments, the personal information includes financial information about the user determined after verifying the temporary access information.
The foregoing, as well as other features and embodiments, will become more apparent by reference to the following specification, claims, and accompanying drawings.
Drawings
Illustrative embodiments of the invention are described in detail below with reference to the following drawings:
fig. 1 illustrates a high-level diagram of a system for enabling a user to verify the authenticity of an access management system, according to an embodiment.
Fig. 2 illustrates a high-level diagram of a system for enabling a user to verify the authenticity of an access management system, according to an embodiment.
Fig. 3-4 illustrate sequence diagrams showing operations for enabling a user to verify the authenticity of an access management system, according to embodiments.
Fig. 5 depicts a flowchart illustrating a process for enabling a user to verify the authenticity of an access management system, in accordance with an embodiment.
Fig. 6-9 illustrate Graphical User Interfaces (GUIs) for a process for enabling a user to verify the authenticity of an access management system, according to an embodiment.
FIG. 10 depicts a simplified diagram of a distributed system for implementing embodiments.
Fig. 11 illustrates a simplified block diagram of one or more components of a system environment in which services may be provided as cloud services according to an embodiment of the disclosure.
FIG. 12 illustrates an exemplary computer system that can be used to implement embodiments of the present invention.
Detailed Description
In the following description, for purposes of explanation, specific details are set forth in order to provide a thorough understanding of the embodiments of the invention. It may be evident, however, that the various embodiments may be practiced without these specific details. For example, circuits, systems, algorithms, structures, techniques, networks, processes, and other components may be shown in block diagram form in order not to obscure the embodiments in unnecessary detail. The drawings and description are not intended to be limiting.
The present disclosure relates generally to providing single sign-on (SSO) access. Based on authentication of credential information (e.g., username and password), the SSO session can provide the user with access to one or more systems after initial authentication. Access to the system may provide access to one or more resources. Resources may include any item managed and/or stored by a computing system, such as an application, document, file, electronic content, and so forth. A resource may be identified by a Uniform Resource Locator (URL) or other data indicating the source of the resource.
Certain techniques are disclosed for enabling a user to verify the authenticity of a computing system (e.g., an access management system), such as a computing system that controls access to one or more resources. Specifically, techniques are disclosed for enabling a user to determine the authenticity of an access management system before the user provides credential information to the access management system.
Embodiments disclosed herein enable a user to use information to verify the authenticity of an access management system. The information may be different each time and the user can use this up-to-date information to verify the authenticity of the access server. The data exchange between the access management system and the client system may be modeled as a three-way handshake between the end user and the access management system. Thus, the access management system need not reveal any confidential information unless the user certifies himself with the temporary data. The technology described herein prevents the security risks exposed by using stolen cards or mobile devices by asking the user for temporary data ("what you have") and passwords ("what you know"). The three-way handshake ensures that the authentication is perfectly flawless from the end-user and from the point of view of the access server side.
Some embodiments, such as systems, methods, and machine-readable media, are disclosed for enabling a user to verify the authenticity of an access management system. Fig. 1 illustrates a system 100 in which a user (e.g., user 102) accessing a resource accessible in a session may initiate a process to verify the authenticity of an access management system 140. A user may desire to verify the authenticity of an access management system or any computing system to ensure that access information (e.g., passwords or confidential information) is not compromised by unauthorized systems. For purposes of illustration, a "session" as described herein includes an SSO session; however, the session may include other types of sessions that enable access to the user. Access management system 140 may provide access to one or more resources. The access management system 140 may implement a login system (e.g., an SSO system) that can establish an SSO session to provide SSO access to one or more resources.
Resources may include, but are not limited to, files, web pages, documents, web content, computing resources, or applications. For example, the system 100 may include resources such as applications 120 and/or content accessible through those applications 120. An application may be used to request and access a resource. For example, an application may request access to a web page from a resource server based on a URL identifying the requested resource. The resources may be provided by one or more computing systems, such as a resource server that provides access to one or more resources after authentication of the user 102 in the SSO system.
A user 102 operating a client device (e.g., client device 104) may be presented with one or more interfaces that accept input to enable the user to interact with an access management system (e.g., access management system 140). Examples of interfaces may include Graphical User Interfaces (GUIs) described with reference to fig. 6-9. The interface may be accessed using an application (e.g., application 108) executing on client device 104. Before the user 102 initiates an access process with the access management system 140 for authentication of the user 102, the interface may receive an input requesting verification of the authenticity of the access management system 140. Upon receiving a request from the user 102 to authenticate the access management system 140, the access management system 140 may initiate a process by which the access management system 140 and the client device 104 operated by the user 102 communicate to enable the user to authenticate the access management system 140. The communication between the user and the access management system 140 enables the access management system 140 to verify that it is communicating with the actual user that established access for the user. The communication establishes a three-way handshake between the client device and the access management system 140 to establish trust for authentication between the user and the access management system to provide the user with access to the resource.
The access management system 140 may be implemented by a computing system. The computing system may include one or more computers and/or servers (e.g., one or more access manager servers) which may be general purpose computers, special purpose server computers (including, by way of example, PC servers, UNIX servers, midrange servers, mainframe computers, rack-mounted servers, etc.), server farms, server clusters, distributed servers, or any other suitable arrangement and/or combination thereof. The access management system 140 may run any number of operating systems or various additional server applications and/or intermediate tier applications, including HTTP servers, FTP servers, CGI servers, Java servers, database servers, and the like. Exemplary database servers include, but are not limited to, those commercially available from Oracle, Microsoft, and the like. The access management system 140 may be implemented using hardware, firmware, software, or a combination thereof.
In some embodiments, the access management system 140 may be implemented by multiple computing devices (e.g., access manager servers) deployed as a cluster in a data center, which allows for scalability and high availability. A plurality of such geographically dispersed data centers having a cluster of access manager servers may be connected (wired or wireless) to form a Multiple Data Center (MDC) system. The MDC system can meet the high availability, load distribution, and disaster recovery requirements of access servers within an enterprise computer network. The MDC system may act as a single logical access server to support SSO services for the access management system 140.
The access management system 140 may include at least one memory, one or more processing units (or processor (s)), and a memory. The processing unit(s) may be suitably implemented in hardware, computer-executable instructions, firmware, or a combination thereof. In some embodiments, the access management system 140 may include several subsystems and/or modules. For example, the access management system 140 may include a session engine 142, an authorization engine 144, a system authentication manager 146, and a personal information handler 148, each of which may be implemented in hardware, software executing on hardware (e.g., program code, instructions executable by a processor), or a combination thereof. In some embodiments, the software may be stored in a memory (e.g., a non-transitory computer-readable medium), on a memory device, or on some other physical memory, and may be executed by one or more processing units (e.g., one or more processors, one or more processor cores, one or more GPUs, etc.). Computer-executable instructions or firmware implementations of the processing unit(s) may include computer-executable instructions or machine-executable instructions written in any suitable programming language to perform the various operations, functions, methods and/or processes described herein. The memory may store program instructions that are loadable and executable on the processing unit(s), as well as data generated during the execution of these programs. Memory may be volatile (such as Random Access Memory (RAM)) and/or nonvolatile (such as Read Only Memory (ROM), flash memory, etc.). The memory may be implemented using any type of persistent storage device, such as a computer-readable storage medium. In some embodiments, a computer-readable storage medium may be configured to protect a computer from electronic communications containing malicious code. The computer-readable storage medium may include instructions stored thereon that, when executed on a processor, perform the operations described herein.
Fig. 1 illustrates an example in which a user 102 may communicate with an access management system 140 to validate the access management system 140 before initiating an authentication process (e.g., the user submitting credential information). In this example, a user 102 operating a client device 104 may attempt to access a resource, such as an application 108, e.g., any one of applications 120 or a resource accessible through an application 120. After successfully authenticating the information credentials of the user 102, the application 120 may be accessed by the user 102. Before one of the applications 120 is accessible to the user 102 at the client device 104, the user 102 may authenticate for a session that provides the user 102 with access to the application 120. The client device 104 may initiate the authentication process by requesting access from the access management system 140. The authentication process may include the client device 104 displaying one or more GUIs to receive the user's credential information and submit a request for authentication to the access management system 140. Authentication may be established based on verifying credential information of the user 102.
In attempting to access an application, user 102 may operate an application (e.g., application 108) that manages access to a user account via access management system 140. For example, the application 108 is an access management application that can present a GUI, such as depicted in FIGS. 6-9. Using the application 108, the user 102 may initiate a verification process to determine the authenticity of the access management system 140 (i.e., whether the access management system 140 is responsible for authentication of the user 102). The authentication process may include one or more communications 130 from the client device 104 to the access management system 140 ("user authentication communications"). The authentication process may include one or more communications 132 associated with the user initiating the authentication process ("system authentication communications") from the access management system 140 to one or more client devices (e.g., client device 104). Some embodiments of the verification process are described further below.
Communication between the client device 104 and the access management system 140 may be received through a gateway system. The gateway system may support access management services. For example, a single sign-on (SSO) gateway can implement one or more access proxies, such as proxy 106 (e.g., a web gateway proxy), to balance and/or process requests from clients and access management system 140.
In at least one embodiment, the authentication process can be initiated by the user 102 in the application 108. The application 108 may present a GUI that prompts the user 102 to enter credential information. When the user is no longer authenticated, credential information may be requested. The absence of a session or the expiration of a session may cause the access management system 140 to request credential information for the protected resource from the user 102. The application 108 may present a GUI that enables the user 102 to request authentication of the access management system 140 prior to providing credential information. After initiating the request for system authentication, a user authentication communication 130 (e.g., a system authentication request) may be sent from the client device 104 to the access management system 140 to initiate authentication of the access management system 140. In particular, the system verification may determine the authenticity of the computing system that handles the authentication of the access management system 140.
Upon receiving the system authentication request, the system authentication manager 146 of the access management system 140 may manage the system authentication. The system authentication manager 146 may determine temporary access information (e.g., a one-time password) for verification by the user 102. The temporary access information may be constrained by one or more criteria (e.g., time). Examples of temporary access information may include passwords, codes, tokens, keys, or other information subject to one or more criteria. The temporary access information may be generated upon receipt of a system authentication request, or may be previously generated. The access management system 140 may store the temporary access information in the data store 160 ("temporary password").
The system authentication manager 146 may send the temporary access information in the system authentication communication 132 to the client device 104 for receipt by the user 102. The user 102 may operate the client device 104 to send the user authentication communication 130 to the access management system 140 along with the temporary access information. The access management system 140 may check the temporary access information returned by the user to determine if it matches content previously sent to the user 102.
The personal information handler 148 of the access management system 140 may generate personal information that may only be known or accessible by the user. In some embodiments, personal information may be obtained from a third party source (e.g., a financial system or a system providing personal information) that is not part of the access management system being authenticated. The user 102 may have previously registered with the access management system 140 to provide information from one or more sources (e.g., third party systems) to access personal information. The personal information may include recent information associated with the user that is not otherwise accessible by unauthorized users that do not have privileges to access the information. The personal information may be stored in a data store, such as data store 170 ("personal information"). The recent personal information may include, for example, financial information obtained from a current financial record (e.g., a bank record). To ensure that the personal information is based on the current record, the personal information handler 148 may determine the personal information after the system authentication manager 146 verifies the temporary access information.
The system authentication manager 146 may send a system authentication communication 132 including the personal information to the client device 104. The client device 104 may present an interface that displays the personal information and, using the interface, the user 102 may indicate whether the personal information is correct. If the user indicates that the personal information is correct, the interface may accept the credential information to determine the user's authentication. If the personal information is incorrect, the user may so indicate and may choose not to provide credential information. Thus, the verification of the personal information enables the user 102 to determine whether the access management system 140 is authentic. If the personal information is incorrect, the user 102 may determine that the access management system 140 is not authentic, thereby preventing the user from sharing credential information to potentially unauthorized computing systems.
Based on successful authentication of the credential information, the user 102 may access the resource (e.g., application 120). Upon receiving the credential information, session engine 142 can verify that the requested resource (e.g., application 170) is a protected resource that requires credentials to access. The session engine 142 may request the authorization engine 144 to determine whether access to the resource is protected.
Upon determining that access to the resource is not protected, session engine 142 may grant access to the resource.
Upon determining that access to the resource is protected, the session engine 142 may determine the authentication of the user 102 based on the credential information. After determining the authentication of the user 102, the authorization engine 144 may determine whether the user 102 is authorized to access the resource based on the access granted to the user 102. The session engine 142 may send a communication to the client device 104 to indicate whether access to the resource is allowed by the user 102. Based on whether access is allowed, the application 108 may be enabled for the user 102.
The access management system 140 may provide a number of SSO services including management of access to resources (e.g., granting/denying access), automatic login, change and reset of application passwords, session management, application credential provisioning, and authentication of sessions. In some embodiments, the accessThe question management system 140 may be an application 120 (such as running or accessed from a client device)Applications, Web applications,Applications and mainframe/terminal based applications) provide automatic single sign-on functionality. As explained above, the access management system 120 may perform authentication of a user (e.g., user 102) operating a client device (e.g., client device 104). Authentication is a process by which a user is verified to determine that he/she is who he/she claims to be.
In some embodiments, access management system 140 may control access to resources using one or more policies stored in data store 180 ("policies"). Policy 180 may include an authentication policy that specifies an authentication method to be used to authenticate a user for whom access to a given resource must be provided. Policy 180 defines the manner in which resource access is protected (e.g., the type of encryption, etc.). Policies 180 may include authorization policies that specify conditions under which a user or group of users may access a resource. For example, an administrator may only authorize certain users within a group to access a particular resource. The access management system 140 may determine the authentication of the SSO session based on one or more of the policies 180.
The access management system 140 may also include or be coupled to additional storage that may be implemented using any type of persistent storage device, such as a memory storage device or other non-transitory computer-readable storage medium. In some embodiments, the local storage may include or implement one or more databases (e.g., a document database, a relational database, or other type of database), one or more file repositories, one or more file systems, or a combination thereof. For example, access management system 140 is coupled to or includes one or more data stores for storing data such as temporary password 160, personal information 170, and policy 160. Memory and additional storage are examples of computer-readable storage media. For example, computer-readable storage media may include volatile or nonvolatile, removable or non-removable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules, or other data.
Session engine 142 may process a process to determine if there is an active session for user 102 to access the resource. Session engine 142 checks for an active session that lets user 102 access the protected requested resource. The session engine 142 may evaluate the validity of the session of the user 102 based on considerations of one or more access policies applicable to the user 102. Based on determining that there is no active session for the user 102, the session engine 102 may request 108 credential information ("credentials") from the user 102. Successful authentication of the credential information may provide the user with access to one or more resources, which may include the requested resource.
The request may be transmitted to the client device 104, and the client device 104 in response prompts the user 102 to enter user credentials to determine authentication of the session. The request may include information (e.g., a URL) to a web page or user interface (e.g., a web page, portal, or dial) that receives the credential information. The request may be transmitted to the client device 104, and the client device 104 in response prompts the user 102 to enter user credentials to determine authentication of the session.
The session engine 142 may perform operations to authenticate credential information for the user 102. In some embodiments, session engine 142 may store information about the session established upon successful authentication of the user. For SSO sessions (e.g., SSO authenticated sessions), the SSO session can be managed as an SSO session that enables access to all resources accessible to a user based on successful authentication of the user's credential information.
In some embodiments, the session engine 142 may communicate with the authorization engine 144 regarding the scope of the authentication. The authorization engine 210 may determine the protected resources and, based on the authentication session 150, may determine the resources that are allowed and/or restricted for the session.
In some embodiments, the access management system 140 may be implemented in the system 100 according to a proxy-server model for communication between the client device 104 and any of the access manager servers implemented for the access management system 140. The proxy-server model may include a proxy component (e.g., a gateway system) and a server component. The agent component can be deployed on a host system and the server component can be deployed on a server, such as an access manager server. A user 102 operating a client device 104 may communicate with an access management system 140 via a proxy 106 using an enterprise computer network. The client device 104 may be a workstation, Personal Computer (PC), laptop, smart phone, wearable computer, or other networked electronic device.
The agent 106 may provide access control and may operate to protect the access management system 140 and any resources accessible through the access management system 140 from external and internal web-based threats. The access management system 140 may communicate with one or more resource computing systems (e.g., resource servers) that provide access to one or more resources (e.g., applications 120). The agent 106 may implement or operate as an agent component access management system 140 and may include a server operating as a server component. Each resource accessible through the access management system 140 may be protected by a proxy (e.g., proxy 106). The proxy 106 may intercept a user request for one or more resources protected by it and check user credentials in order to authenticate the user. The agent may then contact a server, such as an access manager server at access management system 140. The access management server may verify that the resource is a protected resource that requires credentials to access. If the access management server determines that the resource is unprotected, the agent 106 may grant access to the user 102. If the resource is protected, the proxy 106 may request the user 102 to provide authentication credentials.
In some embodiments, the communication between the agent 106 and the access management system 140 may be split into two different communication channels. For example, communication via the front-end channel may use the hypertext transfer protocol secure (HTTPS) protocol. The front-end channel communications may include less frequent communications, such as communications for authenticated credential collection operations. Communication via the back-end channel may use the Open Access Protocol (OAP). Back-end channel communications may include more frequent communications, such as proxy-server interactions including requests to access resources managed by access management system 140. Each channel may communicate using an access token designed for the type of communication on that channel. The access flow may generate two types of browser tokens. The first token is an access management ID token (e.g., OAM _ ID token) that services SSO requests that propagate over HTTP. The second token is an authorization token (e.g., an OAMAuthn token) that may be used to service SSO requests that propagate through the OAP. The browser token may be stored as a host cookie at the client device 104.
The access management system 140 (e.g., using the proxy 106) may present the request for authentication credentials to the user 102 in the form of a challenge (e.g., via the user's web browser at the client device 104). In some embodiments, the user 102 may access the SSO user interface through a client executing on the client device 104 or through a web browser on the client device 104. The SSO user interface can be implemented at the access management system 140. The access management system 140 may send the SSO user interface or information (e.g., a URL) that enables access to the SSO user interface with the request 108.
In some embodiments, the SSO user interface can include a list of applications that the user 102 typically uses. The user 102 may manage their credentials and policies associated with the application through the SSO user interface. When a user 102 requests access to an application (e.g., application 140) through an SSO user interface, a request can be sent from the client device 104 to the access management system 140 to determine a policy type for the application from among one or more policies 160 applicable to the user 102. The access management system 140 may determine whether there is an active session for the user and, if so, it may determine credential information for the user 102 based on the policy type.
In some embodiments, the request may include an authentication cookie from a previous login, which may be used to determine whether the user 102 is authorized to retrieve credentials. If authorized, the user may log into the application using the credentials. In some embodiments, the proxy 106 may enable the user to access the application 120 using SSO services provided by the access management system. Access may be provided directly through a web browser without first accessing an SSO user interface or using a client executing on the client device 104. If the user 102 is not authorized, the access management system may request 108 credentials from the user 102. The SSO user interface can present an interface that receives input including credential information. Credential information may be sent 110 to the access management system 140 to determine the authentication of the user 102.
In some embodiments, credential types may be supported, such as Oracle Access management protected resources, federated applications/resources, and form filling applications. Examples of credential types may include smart card/Proximity card (Proximity card), token, Public Key Infrastructure (PKI), Windows login, Lightweight Directory Access Protocol (LDAP) login, biometric input, and so forth. For OAM protected resources, the user request may be authenticated and then directed to the URL associated with the requested resource. For federated applications, links to federated partners and resources, including business-to-business (B2B) partner applications and SaaS applications, may be provided. For form filling applications, templates may be used to identify fields of the application web page through which credentials may be submitted.
In some embodiments, the SSO user interface that receives input for providing authentication credentials may include one or more interactive elements to initiate system verification. Examples of interfaces may include those described with reference to fig. 6-9.
Turning now to fig. 2, a system 200 is illustrated in which a user 102 may initiate a process to verify the authenticity of the access management system 140. The example shown in fig. 2 may include the elements of fig. 1. In the example illustrated by system 200, verifying the authenticity of access management system 140 may be facilitated by one or more communications between access management system 140 and client device 104 initiating the verification of access management system 140, and by one or more communications between access management system 140 and one or more destinations (such as client device 210). The destination may not be physically co-located with the client device 104. The destination may correspond to a location, such as an email address or telephone number, from which data may be transmitted and/or received. A user operating the client device 104 may access the destination such that the user may facilitate authentication of the access management system 140. The destination may enable the user to receive information from the access management system 140 and/or transmit information to the access management system 140.
Communications with the destination can be considered out-of-band, such that the communications are with devices not located at the client device 104 and/or use a different communication mechanism than the communications with the client device 104. The communication with the destination may enable secure transfer of information for authenticating the access management system 140 in order to prevent unauthorized users from gaining access to the authenticated information for accessing the access management system 140. In at least one embodiment, the authentication of the access management system 140 can include the access management system 140 sending one or more communications 202 ("system authentication communications") to one or more destinations (e.g., client devices 210). Authentication of the access management system 140 may include a destination to send one or more communications 204 ("user authentication communications") to the access management system 140.
In at least one example, the access management system 140 can send one or more system authentication communications 202 to the client device 210 to provide information, such as temporary access information and/or personal information, as part of the authentication of the access management system 140. A user operating the client device 104 may access the destination to send a user authentication communication 204 to the access management system to confirm receipt of the information. The user may access the destination to obtain information from the access management system 140 and respond to the access management system 140 from the client device 104 with the information obtained from the destination. In this manner, information may be communicated between the access management system 140 and the user in a secure manner to reduce, if not prevent, unauthorized users from obtaining information for authentication of the access management system 140. The use of the client device 104 and the destination further ensures that information for authentication is received and/or verified. In some embodiments, an application 208 at a destination, such as a client device 210, may provide an interface to facilitate communication of verified information for access management system 140.
In some embodiments, access management system 140 may support a registration process by which a user operating client device 104 may register one or more destinations for authentication of access management system 140. Registering may include storing information about the destination. Each registered destination may be stored together with user identification information of a user who registered the destination. The access management system 140 may identify the destination based on user identification information provided by the user. The user may specify one or more criteria (e.g., time) for the destination so that the access management system 140 may communicate with the destination according to the criteria. Turning now to fig. 3 and 4, examples of authentication of the access management system 140 are illustrated.
In some embodiments, embodiments such as those described with reference to fig. 3-9 may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, a sequence diagram, or a block diagram. Although a sequence diagram or a flow diagram may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process terminates when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like. When a process corresponds to a function, its termination may correspond to a return of the function to the calling function or the main function.
The processes described herein, such as the processes described with reference to fig. 3-9, may be implemented in software (e.g., code, instructions, programs), hardware, or a combination thereof, which are executed by one or more processing units (e.g., processor cores). The software may be stored in a memory (e.g., on a memory device, on a non-transitory computer-readable storage medium). In some embodiments, the processes depicted in the flow diagrams herein may be implemented by a computing system of an access management system (e.g., access management system 140 of fig. 1 and 2). The particular series of processing steps in this disclosure is not intended to be limiting. Other sequences of steps may also be performed according to alternative embodiments. For example, alternative embodiments of the present invention may perform the steps outlined above in a different order. Moreover, the various steps shown in the figures may include multiple sub-steps that may be performed in various sequences as appropriate to the individual step. While the processes depicted in fig. 3-9 may be described with respect to accessing a single resource, such processes may be performed for multiple resources such that verification of the computing system of the access management system may be requested whenever a resource is accessed and/or authentication of the user's access to the resource needs to be determined. The processes depicted in fig. 3-9 may be described with respect to multiple sessions, and authentication of the computing system accessing the management system may be requested for each session. In addition, additional steps may be added or removed depending on the particular application. One of ordinary skill in the art would recognize many variations, modifications, and alternatives.
In one aspect of some embodiments, each of the processes in fig. 3-9 may be performed by one or more processing units. The processing unit may include one or more processors (including single-core or multi-core processors), one or more cores of a processor, or a combination thereof. In some embodiments, the processing unit may include one or more special-purpose coprocessors such as a graphics processor, a Digital Signal Processor (DSP), or the like. In some embodiments, some or all of the processing units may be implemented using custom circuitry, such as an Application Specific Integrated Circuit (ASIC) or a Field Programmable Gate Array (FPGA).
Fig. 3-4 illustrate sequence diagrams showing operations for enabling a user to verify the authenticity of an access management system (e.g., access management system 140), according to embodiments. Fig. 3 illustrates a sequence diagram 300 for enabling a user to verify the authenticity of an access management system from a client device operated by the user to access one or more resources.
Beginning at step 312, a user operates the client device 302 to request access to a resource ("requested resource") managed by the access management system. The session engine 306 of the access management system may be configured to manage access to resources. The session engine 306 may process the authentication of the client device 302 to establish the session. The session engine 306 may be implemented on a server of the access management system (e.g., an authentication server). For example, session engine 306 may include or implement session engine 142 of fig. 1.
As described above, a resource may be an application or a resource accessible using an application. In the example of fig. 3, a client device 302 may be operated to request access to a resource through an application 304. At step 314, the application 304 may request access to a resource requested by the client device 302. The application 304 may be an access management application that manages access by communicating with an access management system. The user may provide access credentials to the access management system via the application 304 for authentication of the user. The session engine 306 can establish a session (e.g., an SSO session) after successfully authenticating the user. A session may enable a user to access one or more resources from a client device 302.
In some embodiments, a request to access a resource may be handled by a proxy, such as a web gateway. The proxy may protect access to resources provided by the server. The client device 302 may communicate with the access management system 140 by communicating with the session engine 306 directly or indirectly via a proxy. The proxy may intercept a user request for one or more resources protected by the proxy to determine access to the requested resources. The agent may check the user credentials to authenticate the user for a session that accesses those resources controlled by the access management system. The proxy may determine whether the resource is protected and, if so, whether an active session exists to enable access to the resource from the client device 302 via the application 304.
The session engine 306 may process the authentication of the client device 302 to establish the session. Upon receiving a request to access a resource, at step 320, the session engine 306 can determine whether an active session is required to access the resource. For example, the session engine 306 can determine whether access to the resource is protected. Access to the resource may be based on authentication of the user. The session engine 306 may determine whether an active session is active for the user. The presence of an active session may indicate that the user has been authenticated. The session engine 306 can determine whether the active session enables access to a resource, such as a requested resource. In some embodiments, the authentication may be specific to certain resources. In some embodiments, the session engine 306 may evaluate the validity of a user's session based on considerations of one or more access policies applicable to the user.
At step 322, session engine 306 may determine that the user is not authenticated to access the requested resource. The session engine 306 may determine that the user is not authenticated by determining that there is no active session for the user. At step 330, after determining that the user is not authenticated to access the resource, the session engine 306 may send a request for user credential information ("request for user credentials") to the client device 302. The client device 302 receives a request for credential information. In some embodiments, the request from step 330 may be received via application 304.
In response to the request for user credentials, the client device 302 may provide an interface that enables the client device to receive credential information. The interface may be provided in an application, such as application 304. An example of an interface is described below with reference to fig. 6. The interface may include one or more interactive elements to enable the user to request authentication of a system (e.g., an access management system including session engine 306) that is requesting the user's credentials. To request authentication of the system, the interface may enable the user to enter user credentials (e.g., user identification information) that identify the user associated with the request. As described further below, the session engine 306 can use the user identification information to determine a destination for communications related to authentication of the system. At step 332, the client device 302 may receive a request for system authentication. The client device 302 may receive user identification information. At step 340, the client device 302 may send a request for system authentication to the session engine 306. The request may be sent with the user identification information.
At step 350, the session engine 306 may determine whether the user requesting system authentication may request system authentication. The session engine 306 may begin a system authentication process to authenticate the access management system by access verifying the user identification information. The session engine 306 may verify the user identification information by determining whether the user identification information is valid (e.g., present), and if so, whether it is associated with the user. The session engine 306 may access the identity management system to verify user identification information.
After the session engine 306 verifies the user identification information (i.e., determines that the user identification information is valid and that the user identification information is associated with the user), the session engine 306 may receive communication preferences associated with the user identification information from the identity management system. The communication preferences may indicate one or more destinations designated to receive temporary access information for system authentication. The session engine 306 can communicate with the destination(s) to provide temporary access information.
At step 350, the session engine 306 may determine temporary access information (e.g., a one-time password) for a user requesting system authentication of the access management system. The temporary access information may be used as part of a system authentication process. The temporary access information may be generated by the access management system and/or may be obtained from a third party system. In some embodiments, the temporary access information may be generated prior to the request for system authentication. The temporary access information may be associated with one or more constraints that limit the use of the temporary access information to a limited period of time.
At step 352, session engine 306 may send the temporary access information to the user requesting system authentication. The temporary access information may be sent to the user at one or more destinations identified based on the user's communication preferences. As described above, the communication preferences may be retrieved using the user identification information. In some embodiments, the destination may comprise a client device (e.g., client device 302) requesting system authentication. By default (e.g., when the user does not provide communication preferences), the temporary access information may be sent to the client device requesting system authentication (e.g., 302). The temporary access information may be communicated to the client device using one or more communication systems (e.g., a messaging service).
At step 360, the user requesting system authentication may operate the client device 302. The user may operate the client device 302 to obtain temporary access information. The client device 302 may provide an interface with one or more interactive elements that receive temporary access information. The user may operate the client device 302 to provide temporary access information in the interface. The client device 302 receives the temporary access information provided into the interface. At step 362, the client device 302 can send the temporary access information to the access management system (e.g., the session engine 306) to continue processing of system authentication.
At step 370, session engine 306 may verify the temporary access information. Verifying the temporary access information may include determining whether a constraint of the temporary access information is satisfied. For example, where the temporary access information is associated with a time limit, the session engine 306 may determine whether the temporary access information has expired based on the time limit. When the constraints are not satisfied (i.e., when the temporary access information has expired), the temporary access information cannot be accepted for system verification. At step 352, verifying the temporary access information may include determining whether the temporary access information matches the temporary access information sent to the client device 302. The temporary access information may be stored in association with user identification information of the user requesting system authentication.
Also, at step 370, the session engine 306 may determine personal information as part of system authentication. The personal information may be determined when the temporary access information is checked. The personal information may be generated by the session engine 306. In some embodiments, personal information may be obtained from a third party source (e.g., a financial system) that is not part of the access management system being authenticated. The personal information may include recent information associated with the user that is not otherwise accessible by users that are not holders of the user identification information (e.g., unauthorized users). The recent information may include, for example, financial information obtained from a current financial record (e.g., a bank record). To ensure that the personal information is based on the current record, the session engine 306 may determine the personal information when verifying the temporary access information.
At step 372, session engine 306 may send personal information to a client device associated with the user requesting system authentication. The client device may be a device requesting system authentication. By sending the personal information to client devices known to be associated with the user, it is ensured that the session engine 306 personal information is not sent to users who are not authorized to access the personal information. It may be ensured that the user personal information operating the client device 302 comes from a trusted source that is verified as authorized to access the management system. At step 380, the client device associated with the user requesting system authentication may display personal information for verification by the user. For example, personal information may be displayed in the interface. It is assumed that the client device requesting system authentication may be the client device receiving the personal information. Since the personal information is sent by the access management system as part of the system authentication, the personal information may be accurate and current with respect to the user requesting the system authentication. The personal information may be determined based on recent queries about the user's personal information after system authentication requested by the user.
At step 380, the client device 302 may present an interface to the user that enables the user to provide input to verify that the personal information is correct. After verifying that the personal information is correct, the client device 302 may present an interface to the user to receive credential information corresponding to the user's user identification information. After verifying that the personal information is accurate, the system authentication process may be completed by the user submitting credential information. The client device 302 may send the credential information 382 to the session engine 306 for verification.
At step 390, the session engine 306 may verify the user's credential information. Verifying the credential information may include determining whether the credential information matches previously established credential information associated with user identification information of the user. Access to the requested resource at step 312 may be authorized based on verifying that the credential information is correct. At step 392, the session engine 306 may grant access to the requested resource. Access may be granted by storing information indicating that access is granted. The session engine 306 can send data to the client 302 indicating information about authorized access. In some embodiments, data regarding authorized access may be sent to application 304. At step 394, the application 304 can enable access to the resource (e.g., application 304) based on the indication received from the session engine 306 that access has been authorized.
Turning now to fig. 4, a sequence diagram 400 for enabling a user to verify authenticity of an access management system using multiple client devices is shown. In particular, sequence diagram 400 illustrates that system authentication of the access management system can be facilitated using an out-of-band communication channel. For example, system verification described with reference to fig. 3 may be enhanced by adding out-of-band communication with a destination 410 that is physically separate from the client device 302 ("out-of-band destination"). For example, destination 410 may be a client device that is in the control of a user operating client device 302 and that is different from client device 302. The destination 410 may be a mobile communication device and the client device 302 may be a desktop computer. Out-of-band communication may improve the security of the system authentication process by preventing or making it more difficult for unauthorized users (e.g., hackers or identity thieves) to obtain sensitive information such as personal information and temporary access information.
Based on the example shown in fig. 3, the example in fig. 4 illustrates communication with an out-of-band destination as part of system verification. The out-of-band destination is useful to enable a user to receive and/or transmit important communications as part of system authentication without corrupting the information sent in the communications. Since a hacker may not know the destination, security may be improved by communication with the destination. Thus, a hacker may not be able to access or intercept information such as personal information and temporary access information.
A user operating client device 302 may register with the access management system before any processing occurs, such as system authentication depicted in fig. 3 and fig. 4. The user may register by providing information about the user, including information about one or more destinations for system authentication. The information about the destination may include device information about one or more client devices controlled by the user and/or any information about other types of destinations (e.g., email account information). Information about the user may be stored in association with user identification information and credential information. In some embodiments, a user may register information with an identity management system accessible to the access management system. Registration may include the user providing information about the destination. The access management system may communicate with the user for system authentication via one or more of the client device and/or the out-of-band destination that initiated the system authentication.
The example shown in fig. 4 may include similar elements as fig. 3. A user operating client device 302 may request access to a resource controlled by an access management system that includes session engine 306. As part of obtaining access to the requested resource, the user may initiate system authentication of the access management system. After initiating system authentication, session engine 306 may communicate with the user via out-of-band destination 410 to perform one or more steps of the system authentication process.
In some embodiments, after determining the temporary access information at step 350, the session engine 306 may send the temporary access information to one or more destinations different from the client device 302. For example, at step 452, session engine 306 may send temporary access information (e.g., a temporary password) to destination 410. In addition to or instead of sending the temporary access information to the client device 302, the session engine 306 can send the temporary access information to the destination 410. In the event that temporary access information is not sent to the client device 302, the user operating the client device 302 may have to obtain the temporary access information from the destination 410. At step 454, the destination (if a device) may send the temporary access information to the client device 302, or if accessible to the user, the user may be able to obtain the temporary access information from the destination 410. As described above, the temporary access information is provided by the user to the access management system as part of the system authentication process. In fig. 4, the client device 302 may receive as input from a user at step 360 or receive temporary access information from the destination 410 at step 454.
In some embodiments, the access management system may send the personal information to one or more out-of-band destinations (e.g., destination 410) in addition to or instead of sending the personal information to the client device 302 as part of system authentication. For example, after generating the personal information at step 370, the session engine 306 may send the personal information to the destination 410. To enhance the security of system authentication, personal information may be sent to an out-of-band destination to prevent access by unauthorized users. An unauthorized user may not know the presence of the destination and, even so, may not know the personal information associated with the system authentication process. In some embodiments, personal information may be shared between the client device 302 initiating system authentication and the one or more destinations receiving the personal information.
Continuing with the system authentication process, the personal information received anywhere may be evaluated by the user to determine if it is correct. In some embodiments, the system verification process may include providing an interface (e.g., the interface in fig. 8) to enable a user to provide input to indicate whether the personal information is correct. The interface may be presented to the user at the client device 302 or the destination 410. In the example of fig. 4, an interface may be presented to the user at step 380. At step 380, client device 302 may receive an input at client device 302 via an interface indicating a verification of personal information.
Thus, by providing one or more destinations as part of system authentication, it may be ensured that the user access management system is not corrupted by unauthorized users during system authentication.
Fig. 5 illustrates a flow diagram 500 of a process for enabling a user to verify the authenticity of an access management system, according to an embodiment. In some embodiments, the processing depicted in flowchart 500 may be implemented by access management system 140 of fig. 1 and 2.
In some embodiments, the access management system may determine whether the user is authenticated based on whether there is an active session (e.g., an SSO session) for the user. After determining that an active session exists, the user may be authenticated. In some embodiments, the access management system may determine whether the user has access to the resource requested by the user for an active session (if any).
At step 504, a request may be sent to a client device operated by a user. The request may be sent credential information for the user to authenticate the user. After determining that the user is not authenticated (e.g., is not authenticated to access the resource), a request may be sent.
At step 506, a verification request may be received from the client device. The authentication request may be submitted to request authentication of a computing system accessing the management system. The computing system requesting authentication may be the same computing system that requested the authentication information from the user. In some embodiments, the user may submit a validation request that may be submitted through a GUI (such as the GUI further described below with reference to fig. 6). The GUI may receive input including user identification information. The user identification information may be included in the authentication request. As described further below, the user identification information may enable the access management system to determine a destination for communication of temporary access information (e.g., a one-time password).
A destination associated with the user may be identified at step 508. The destination may be identified based on user identification information in the authentication request (e.g., the authentication request received at step 506). The user identification information may include a user identification (e.g., a username) or other information (e.g., a telephone number or email address) that uniquely identifies the user. In one example, the access management system may retrieve a profile of the user identified by the user identification information from the identity management system. The destination may be identified based on a profile indicating one or more destinations for communicating with the user. The destination may include an email address, a phone number of the mobile device, or any other location where information may be sent.
At step 510, the temporary access information may be sent to a destination. The destination may be a destination identified based on user identification information in the authentication request. Temporary access information may be sent for a user to authenticate the computing system. The temporary access information may be a one-time password (OTP) used by the user to confirm the sender of the temporary access information. The temporary access information may enable the user to verify that the computing system of the access management system is in fact the real computing system of the access management system.
To protect unauthorized access to user accounts managed by the access management system, the access management system may communicate with the user at a destination different from the client device. The destination may be out-of-band or out-of-channel from the client device requesting authentication of the access management system. The destination may be located on a device that is accessible to the user or may be accessible to the user (e.g., a location in memory or accessible at a remote computing system). The destination may be selected such that it is unknown to unauthorized systems that are intended to fraudulently gain access to the user account. For example, the destination is a client device (e.g., a mobile device) that is different from the client device (e.g., a terminal) that sent the authentication request. In another example, the destination is an email address to which an email message including the temporary access information may be sent. In some embodiments, the destination is the same client device from which the authentication request was received.
At step 512, a response may be received from a client device (e.g., the client device that sent the authentication request). The response may include temporary access information sent to the destination. The user can obtain temporary access information from the destination. In some embodiments, a GUI such as that shown with reference to fig. 7 may be presented at the client device to receive temporary access information obtained by the user from the destination. The temporary access information may be included in the response received from the GUI.
At step 514, the temporary access information received in the response at step 512 may be checked. The access management system may determine whether the temporary access information received from the client device is the same as or matches the temporary access information sent to the destination. In some embodiments, the temporary access information may be limited or temporary such that it is associated with one or more constraints (e.g., time periods). The temporary access information, while received by the destination, may be invalid when the constraint(s) are not satisfied. Verifying the temporary access information may include determining whether the constraint(s) for temporary access information have been satisfied.
At step 516, personal information about the user of the client device that sent the authentication request may be sent to the client device. After verifying that the temporary access information satisfies the constraint, the personal information may be sent to the client device. As part of the authentication of the access management system, the access management system may provide personal information about the user to enable the user to verify the authenticity of the user before providing his/her credentials to the access management system. The personal information may include current information that is not accessible by other computing systems (e.g., phishing or hacker computing systems designed to fraudulently gain access to the user account). The personal information may be supplied by one or more sources to which the user has authorized access to the access management system. Examples of personal information may include financial information (e.g., recent transactions, recent account balances, etc.) or other private or confidential information. The personal information may include information that has been recently updated so that the chance of unauthorized access is less likely.
When the client device receives the personal information, the client device may display the personal information in the GUI, such as the example described with reference to fig. 8. Through the GUI, the user can verify the personal information to confirm its authenticity. The GUI may include one or more interactive elements to receive confirmation of the user's personal information and credential information (e.g., password) associated with the user identification information received with the authentication request at step 506.
At step 518, a response may be received from the client device requesting authentication of the access management system. A response may be received from the client device in response to input received via the GUI indicating that the personal information sent at step 516 was verified to be accurate. The response may include credential data for the user confirming the personal information. The credential data may include credential information (e.g., a password) for accessing an account associated with the user identification information received at step 506.
The user that sent the response at step 518 may be authenticated to determine access to the resource from the client device. The user may be authenticated based on the credential data received at step 518. The credential data may be compared to stored credential information for user identification information of the user to determine if they match. At step 520, after determining that the credential data matches the stored credential information, the user may be authenticated for access to the resource. After user authentication, a session may be established at the client device for the user to access the resource. In some embodiments, the user may be further authenticated based on the acknowledgement of receipt in the response received at step 518. Access may be granted to the user based on determining that the user is authenticated to access the resource from the client device. The flowchart ends at step 522.
Fig. 6-9 illustrate interfaces (e.g., GUIs) for enabling a user to verify the authenticity of an access management system, according to embodiments. Each of the GUIs of fig. 6-9 may be displayed in an application, such as application 108 of fig. 1. GUI 600 may be displayed by an access management application that manages access to one or more resources. GUI 600 may be generated by a client device, may be received from an access management system that generates the GUI, or a combination thereof. GUI 600 may be provided by an access management system via a network as part of a service (e.g., a cloud service) or network-accessible application. In at least one example, an operator of the access management system may operate a client device to interact with GUI 600.
Turning now to FIG. 6, a GUI 600 is depicted that enables a user to enter credential information to establish a session (e.g., an SSO session) to access one or more resources. GUI 600 may include one or more interactive elements to enable a user to gain access to an account providing the session. For example, GUI 600 may include an interactive element 610 to receive credential information such as user identification information (e.g., a username). GUI 600 may include an interactive element 630 that receives input to initiate an access process (e.g., a login process) for authentication of a user. The access process may enable the user to access an account managed by the access management system. By initiating the access process, the GUI described with respect to fig. 9 may be displayed to receive input, e.g., credential information (e.g., a password), to determine access by a user associated with user identification information.
In some embodiments, GUI 600 may include an interactive element 620, the interactive element 620 receiving input to initiate a confirmation request to determine authenticity of a computing system requesting credential information via GUI 600. By initiating the confirmation request, the user may be enabled to determine whether the computing system requesting the credential information is actually a genuine (e.g., non-fraudulent) system that manages access to the account associated with the credential information.
In FIG. 7, a GUI 700 is depicted that enables a user to enter temporary access information (e.g., a one-time password). As described above, the temporary access information may be received by the client device from a computing system of the access management system as part of an authentication process. The access management system may establish its authenticity by sending the temporary access information to a destination (e.g., a device other than the client device requesting authentication of the access management system). As part of the process of authenticating the access management system, the access management system may send a request to a client device (e.g., the client device that initiated the authentication request) to receive temporary access information sent to the destination. In some embodiments, the client device may display GUI 700 that receives temporary access information via interactive element 710. GUI 700 may include an interactive element 720, which interactive element 720 receives input to send (e.g., submit) temporary access information to the access management system. The temporary access information may be submitted to an access management system. The access management system may confirm the user's verification of the temporary access information. The access management system may check the temporary access information to determine if it matches the temporary access information sent to the destination.
In fig. 8, a GUI 800 is shown that enables a user to determine the authenticity of an access management system. The GUI 800 may display personal information about a user requesting authentication of the access management system. As described above, the access management system may transmit personal information about a user to a client device operated by the user requesting authentication of the access management system. The personal information may be transmitted to the user after checking the temporary access information received from the user. In some embodiments, the personal information may be sent to a client device that initiates a request to determine the authenticity of the access management system.
The client device may display GUI 800 to provide personal information for verification by a user operating the client device. The personal information may be provided as part of a process for verifying the authenticity of the access management system. The user may view the personal information displayed by GUI 800 to determine if it is accurate. GUI 800 may include one or more interactive elements to receive input indicating whether the personal information is accurate. The interactive element(s) may enable the user to submit a request to the access management system to confirm the accuracy of the personal information. In some embodiments, the interactive element(s) in GUI 800 may receive input to send an access request (e.g., a login request) to access an account of the user for which personal information is displayed. For example, GUI 800 may include an interactive element 820 that receives input requesting access to an account. Upon receiving input via interactive element 820, the access request may be submitted to an access management system. GUI 800 may include an interactive element 810 to receive access information (e.g., a password) to access an account of a user for which personal information is displayed. The access information may correspond to user identification information received in the GUI described with reference to fig. 6. The access information may be submitted to the access management system along with the access request. The access management system may determine access to the account based on verifying the access information submitted using GUI 800.
Fig. 9 depicts a GUI 900 that enables a user to provide access information (e.g., a password) to request access to an account associated with the user. The account may be identified by a user identification associated with the account. The user identification information may be provided in a different GUI, such as GUI 600 described with reference to fig. 6. GUI 900 may be displayed when the access process is initiated by interacting with interactive element 630 of fig. 6. GUI 900 may include an interactive element 910 to receive credential information for an account. The interactive element 920 may be interactive to determine a login process based on credential information. In some embodiments, GUI 900 may be displayed when the user decides not to verify the authenticity of the access management system. In some embodiments, GUI 900 and GUI 600 may be combined to reduce the number of steps for a user to provide credential information for an access process.
FIG. 10 depicts a simplified diagram of a distributed system 1000 for implementing embodiments. In the illustrated embodiment, the distributed system 1000 includes one or more client computing devices 1002, 1004, 1006, and 1008 that are configured to execute and operate client applications, such as web browsers, proprietary clients (e.g., Oracle Forms), and the like, over one or more networks 1010. The server 1012 may be communicatively coupled with remote client computing devices 1002, 1004, 1006, and 1008 via a network 1010.
In various embodiments, the server 1012 may be adapted to run one or more services or software applications. In some embodiments, the servers 1012 may also provide other services or software applications may include non-virtual and virtual environments. In some embodiments, these services may be provided to users of client computing devices 1002, 1004, 1006, and/or 1008 as web-based or cloud services or under a software as a service (SaaS) model. A user operating client computing device 1002, 1004, 1006, and/or 1008 can, in turn, interact with server 1012 using one or more client applications to take advantage of the services provided by these components.
In the configuration depicted in FIG. 10, software components 1018, 1020, and 1022 of system 1000 are shown as being implemented on server 1012. In other embodiments, one or more components of system 1000 and/or services provided by these components may also be implemented by one or more of client computing devices 1002, 1004, 1006, and/or 1008. A user operating the client computing device may then utilize one or more client applications to use the services provided by these components. These components may be implemented in hardware, firmware, software, or a combination thereof. It should be understood that a variety of different system configurations are possible, which may differ from distributed system 1000. Thus, the embodiment shown in FIG. 10 is one example of a distributed system for implementing the embodiment system and is not intended to be limiting.
Although distributed system 1000 in fig. 10 is illustrated as having four client computing devices, any number of client computing devices may be supported. Other devices, such as devices with sensors, etc., may interact with the server 1012.
Network(s) 1010 in distributed system 1000 may be any type of network familiar to those skilled in the art that may support data communications using any of a variety of available protocols, including but not limited to TCP/IP (transmission control protocol/internet protocol), SNA (system network architecture), IPX (internet packet exchange), AppleTalk, and the like. By way of example only, network(s) 1010 may be a Local Area Network (LAN), an ethernet-based network, a token ring, a wide area network, the internet, a virtual network, a Virtual Private Network (VPN), an intranet, an extranet, a Public Switched Telephone Network (PSTN), an infrared network, a wireless network (e.g., as in any of the Institute of Electrical and Electronics Engineers (IEEE)802.11 protocol suite, a cable network, a network such as a cable network, a,And/or any other network operating under a wireless protocol) and/or any combination of these and/or other networks.
The server(s) 1012 can be comprised of one or more general purpose computers, special purpose server computers (including, by way of example, PC (personal computer) servers, and the like,Servers, midrange servers, mainframe computers, rack-mounted servers, etc.), server farms, server clusters, or any other suitable arrangement and/or combination. The server 1012 may include one or more virtual machines running a virtual operating system, or other computing architecture involving virtualization. One or more flexible logical storage pools may be virtualized to maintain virtual storage for the servers. The virtual networks may be controlled by the servers 1012 using software-defined networking. In various embodiments, the server(s) 1012 may be adapted to execute one or more of the services or software applications described in the foregoing disclosure. For example, the server 1012 may correspond to a server for performing processing as described above according to an embodiment of the present disclosure.
The server 1012 can execute an operating system including any of the operating systems discussed above, as well as any commercially available server operating system. The servers 1012 can also execute any of a variety of additional server applications and/or intermediate layer applications, including HTTP (HyperText transfer protocol) servers, FTP (File transfer protocol) servers, CGI (common gateway interface) servers, Web servers, and other such media,Servers, database servers, etc. Exemplary database servers include, but are not limited to, database servers commercially available from Oracle, Microsoft, Sybase, IBM (international business machine), and the like.
In some implementations, the server 1012 may include one or more applications to analyze and integrate data feeds received from users of the client computing devices 1002, 1004, 1006, and 1008Send and/or event updates. By way of example, the data feeds and/or event updates may include, but are not limited to, data received from one or more third-party information sources and a continuous data streamFeeding,Updates or real-time updates, which may include real-time events related to sensor data applications, financial tickers, network performance measurement tools (e.g., network monitoring and traffic management applications), clickstream analysis tools, automotive traffic monitoring, and the like. The server 1012 can also include one or more applications that display data feeds and/or real-time events via one or more display devices of the client computing devices 1002, 1004, 1006, and 1008.
Distributed system 1000 may also include one or more databases 1014 and 1016. These databases may provide mechanisms for storing information such as user interaction information, usage pattern information, adaptation rule information, and other information used by embodiments of the present invention. Databases 1014 and 1016 may reside in various locations. By way of example, one or more of databases 1014 and 1016 may reside on non-transitory storage media local to (and/or resident in) server 1012. Alternatively, the databases 1014 and 1016 may be remote from the server 1012 and in communication with the server 1012 via a network-based or dedicated connection. In one set of embodiments, databases 1014 and 1016 may reside in a Storage Area Network (SAN). Similarly, any necessary files for performing the functions attributed to the server 1012 may be stored locally and/or remotely as appropriate at the server 1012. In one set of embodiments, databases 1014 and 1016 may comprise a relational database, such as the database provided by Oracle, adapted to store, update, and retrieve data in response to SQL-formatted commands.
In some embodiments, a cloud environment may provide one or more services. Fig. 11 is a simplified block diagram of one or more components of a system environment 1100 in which a service may be provided as a cloud service according to an embodiment of the present disclosure. In the embodiment illustrated in fig. 11, system environment 1100 includes one or more client computing devices 1104, 1106, and 1108 that may be used by a user to interact with cloud infrastructure system 1102 providing cloud services. Cloud infrastructure system 1102 may include one or more computers and/or servers, which may include those described above for server 1012.
It should be appreciated that the cloud infrastructure system 1102 depicted in fig. 11 may have other components in addition to those depicted. Additionally, the embodiment shown in FIG. 11 is merely one example of a cloud infrastructure system in which embodiments of the present invention may be incorporated. In some other embodiments, cloud infrastructure system 1102 may have more or fewer components than shown in the figures, may merge two or more components, or may have a different configuration or arrangement of components.
Network(s) 1110 may facilitate communication and data exchange between client computing devices 1104, 1106, and 1108 and cloud infrastructure system 1102. Each network may be any type of network familiar to those skilled in the art that may support data communications using any of a variety of commercially available protocols, including the protocols described above for network(s) 1010.
In certain embodiments, the services provided by cloud infrastructure system 1102 may include a host of services available on demand to users of the cloud infrastructure system. Various other services may also be provided, including but not limited to online data storage and backup solutions, Web-based email services, hosted office suites and document collaboration services, database processing, managed technical support services, and so forth. The services provided by the cloud infrastructure system can be dynamically extended to meet the needs of its users.
In certain embodiments, the specific instantiation of a service provided by cloud infrastructure system 1102 may be referred to herein as a "service instance. In general, any service made available to a user from a system of cloud service providers via a communication network (such as the internet) is referred to as a "cloud service". Generally, in a public cloud environment, the servers and systems that make up the cloud service provider's system are different from the consumer's own local servers and systems. For example, a system of a cloud service provider may host an application, and a user may order and use the application on demand via a communication network such as the internet.
In some examples, services in a computer network cloud infrastructure may include protected computer network access to storage, hosted databases, hosted web servers, software applications, or other services provided to users by cloud providers, or as otherwise known in the art. For example, the service may include password-protected access to remote storage on the cloud over the internet. As another example, a service may include a hosted relational database based on web services and a scripting language middleware engine for private use by networked developers. As another example, the service may include access to an email software application hosted on a website of the cloud provider.
In certain embodiments, cloud infrastructure system 1102 may include application suites, middleware, and database services products that are delivered to consumers in a self-service, subscription-based, elastically extensible, reliable, highly available, and secure manner. An example of such a Cloud infrastructure system is the Oracle Public Cloud (Oracle Public Cloud) provided by the present assignee.
Cloud infrastructure system 1102 may also provide computing and analysis services related to "big data". The term "big data" is used generally to refer to an extremely large set of data that can be stored and manipulated by analysts and researchers to visualize large amounts of data, detect trends, and/or otherwise interact with data. Such large data and related applications may be hosted and/or manipulated by the infrastructure system on many levels and different scales. Tens, hundreds, or thousands of processors linked in parallel may act on such data to render it or simulate an external force on the data or the content it represents. These data sets may relate to structured data, such as data organized in a database or otherwise according to a structured model, and/or unstructured data (e.g., emails, images, data blobs (binary large objects), web pages, complex event processing). By taking advantage of the ability of embodiments to relatively quickly focus more (or less) computing resources on a target, the cloud infrastructure system may be better used to perform tasks on large data sets based on demand from a business, government agency, research organization, private individual, a group of like-minded individuals or organizations, or other entity.
In various embodiments, cloud infrastructure system 1102 may be adapted to automatically provision, manage, and track a customer's subscription to services provided by cloud infrastructure system 1102. Cloud infrastructure system 1102 may provide cloud services via different deployment models. For example, the service may be provided under a public cloud model, where cloud infrastructure system 1102 is owned by an organization that sells cloud services (e.g., owned by Oracle corporation) and makes the service available to the general public or a different industrial enterprise. As another example, services may be provided under a private cloud model, where cloud infrastructure system 1102 operates only for a single organization, and may provide services for one or more entities within the organization. Cloud services may also be provided under a community cloud model, where cloud infrastructure system 1102 and services provided by cloud infrastructure system 1102 are shared by several organizations in a related community. The cloud services may also be provided under a hybrid cloud model, which is a combination of two or more different models.
In some embodiments, the services provided by the cloud infrastructure system 1102 may include one or more services provided under a software as a service (SaaS) category, a platform as a service (PaaS) category, an infrastructure as a service (IaaS) category, or other categories of services including hybrid services. A customer, via a subscription order, may order one or more services provided by cloud infrastructure system 1102. Cloud infrastructure system 1102 then performs processing to provide the services in the customer's subscription order.
In some embodiments, the services provided by cloud infrastructure system 1102 may include, but are not limited to, application services, platform services, and infrastructure services. In some examples, application services may be provided by a cloud infrastructure system via a SaaS platform. The SaaS platform may be configured to provide cloud services belonging to the SaaS category. For example, the SaaS platform may provide the ability to build and deliver on-demand application suites on an integrated development and deployment platform. The SaaS platform may manage and control the underlying software and infrastructure used to provide the SaaS services. By utilizing the services provided by the SaaS platform, consumers can utilize applications executing on the cloud infrastructure system. The consumer can obtain the application service without the consumer separately purchasing licenses and support. Various different SaaS services may be provided. Examples include, but are not limited to, services that provide solutions for sales performance management, enterprise integration, and business flexibility for large organizations.
In some embodiments, the platform services may be provided by the cloud infrastructure system 1102 via a PaaS platform. The PaaS platform may be configured to provide cloud services belonging to the PaaS category. Examples of platform services may include, but are not limited to, services that enable organizations (such as Oracle) to integrate existing applications on a shared common architecture, and the ability to build new applications with shared services provided by the platform. The PaaS platform may manage and control the underlying software and infrastructure used to provide PaaS services. A consumer may obtain PaaS services provided by cloud infrastructure system 1102 without the consumer having to purchase separate licenses and support. Examples of platform services include, but are not limited to, Oracle Java Cloud Service (JCS), Oracle database cloud service (DBCS), and others.
By leveraging the services provided by the PaaS platform, consumers can employ programming languages and tools supported by the cloud infrastructure system and also control the deployed services. In some embodiments, the platform services provided by the cloud infrastructure system may include database cloud services, Middleware cloud services (e.g., Oracle Fusion Middleware services), and Java cloud services. In one embodiment, the database cloud service may support a shared service deployment model that enables an organization to aggregate database resources and provide databases as a service to consumers in the form of a database cloud. The middleware cloud service may provide a platform for consumers to develop and deploy various business applications, and the Java cloud service may provide a platform for consumers to deploy Java applications in a cloud infrastructure system.
Various infrastructure services may be provided by an IaaS platform in a cloud infrastructure system. Infrastructure services facilitate management and control of underlying computing resources, such as storage, networks, and other basic computing resources, for consumers to utilize services provided by SaaS platforms and PaaS platforms.
In certain embodiments, cloud infrastructure system 1102 may also include infrastructure resources 1130 for providing resources used to provide various services to consumers of the cloud infrastructure system. In one embodiment, the infrastructure resources 1130 may include a pre-integrated and optimized combination of hardware (such as servers, storage, and networking resources) that perform services provided by PaaS and SaaS platforms, as well as other resources.
In some embodiments, resources in cloud infrastructure system 1102 may be shared by multiple users and dynamically reallocated as needed. In addition, resources can be allocated to users in different time zones. For example, cloud infrastructure system 1102 may enable a first set of users within a first time zone to utilize resources of the cloud infrastructure system for a specified number of hours, and then enable reallocation of the same resources to another set of users located in a different time zone, thereby maximizing utilization of the resources.
In certain embodiments, multiple internal shared services 1132 may be provided that are shared by different components or modules of cloud infrastructure system 1102 to enable the services to be provisioned by cloud infrastructure system 1102. These internal sharing services may include, but are not limited to, security and identity services, integration services, enterprise repository services, enterprise manager services, virus scanning and whitelisting services, high availability, backup and restore services, services for enabling cloud support, email services, notification services, file transfer services, and the like.
In certain embodiments, the cloud infrastructure system 1102 may provide integrated management of cloud services (e.g., SaaS, PaaS, and IaaS services) in the cloud infrastructure system. In one embodiment, cloud management functionality may include the ability to provision, manage, and track subscriptions of consumers received by cloud infrastructure system 1102 or the like.
In one embodiment, as depicted in FIG. 11, cloud management functionality may be provided by one or more modules such as an order management module 1120, an order orchestration module 1122, an order provisioning module 1124, an order management and monitoring module 1126, and an identity management module 1128. These modules may include or may be provided using one or more computers and/or servers, which may be general purpose computers, special purpose server computers, server farms, server clusters, or any other suitable arrangement and/or combination.
In an exemplary operation, at 1134, a consumer using a client device (such as client computing device 1104, 1106, or 1108) may interact with cloud infrastructure system 1102 by requesting one or more services provided by cloud infrastructure system 1102 and placing an order for a subscription to the one or more services provided by cloud infrastructure system 1102. In some embodiments, the consumer may access a cloud User Interface (UI), such as cloud UI 1112, cloud UI 1114, and/or cloud UI 1116, and place a subscription order via these UIs. The order information received by cloud infrastructure system 1102 in response to a customer placing an order may include information identifying the customer and one or more services provided by cloud infrastructure system 1102 to which the customer intends to subscribe.
At step 1136, the order information received from the customer may be stored in the order database 1118. If this is a new order, a new record may be created for the order. In one embodiment, the order database 1118 may be one of several databases operated by the cloud infrastructure system 1118 and operated in conjunction with other system elements.
At step 1138, the order information may be forwarded to an order management module 1120, and the order management module 1120 may be configured to perform billing and accounting functions associated with the order, such as checking the order, and after passing the check, order the order.
At step 1140, information regarding the order may be communicated to an order orchestration module 1122, the order orchestration module 1122 configured to orchestrate the provision of services and resources for the order placed by the customer. In some cases, the order orchestration module 1122 may use the services of the order provisioning module 1124 for provisioning. In certain embodiments, the order orchestration module 1122 enables management of the business processes associated with each order, and applies business logic to determine whether the order should continue to be provisioned.
As shown in the embodiment depicted in FIG. 11, upon receiving a newly subscribed order, the order orchestration module 1122 sends a request to the order provisioning module 1124 to allocate resources and configure the resources needed to fulfill the subscription order, at 1142. The order provisioning module 1124 enables allocation of resources for services ordered by the customer. Order provisioning module 1124 provides a level of abstraction between the cloud services provided by cloud infrastructure system 1100 and the physical implementation layers used to provision the resources used to provide the requested services. This enables the order orchestration module 1122 to be isolated from implementation details, such as whether services and resources are actually provisioned in real-time, or pre-provisioned and allocated/specified only when requested.
At step 1144, once the services and resources are provisioned, a notification may be sent to the subscribed consumers indicating that the requested service is now ready for use. In some cases, information (e.g., a link) may be sent to the consumer that enables the consumer to begin using the requested service.
At step 1146, the customer's subscription orders may be managed and tracked by order management and monitoring module 1126. In some cases, order management and monitoring module 1126 may be configured to collect usage statistics regarding consumer usage of subscribed services. For example, statistics may be collected for the amount of storage used, the amount of data transferred, the number of users, and the amount of system startup time and system shutdown time, among others.
In certain embodiments, cloud infrastructure system 1100 may include an identity management module 1128 configured to provide identity services, such as access management and authorization services in cloud infrastructure system 1100. In some embodiments, identity management module 1128 may control information about customers who wish to utilize the services provided by cloud infrastructure system 1102. Such information may include information that authenticates the identity of the consumers and information that describes actions that those consumers are authorized to perform with respect to various system resources (e.g., files, directories, applications, communication ports, memory segments, etc.). The identity management module 1128 may also include descriptive information about each consumer and management of how and by whom the descriptive information is accessed and modified.
FIG. 12 illustrates an exemplary computer system 1200 that can be used to implement embodiments of the present disclosure. In some embodiments, computer system 1200 may be used to implement any of the various servers and computer systems described above. As shown in fig. 12, computer system 1200 includes various subsystems, including a processing unit 1204 that communicates with a number of peripheral subsystems via a bus subsystem 1202. These peripheral subsystems may include a processing acceleration unit 1206, an I/O subsystem 1208, a storage subsystem 1218, and a communications subsystem 1224. The storage subsystem 1218 may include tangible computer-readable storage media 1222 and system memory 1210.
The processing subsystem 1204 controls the operation of the computer system 1200 and may include one or more processing units 1232, 1234, etc. The processing unit may include one or more processors, including single-core or multi-core processors, one or more cores of a processor, or a combination thereof. In some embodiments, the processing subsystem 1204 may include one or more special-purpose coprocessors, such as a graphics processor, a Digital Signal Processor (DSP), or the like. In some embodiments, some or all of the processing units of the processing subsystem 1204 may be implemented with custom circuitry, such as an Application Specific Integrated Circuit (ASIC) or a Field Programmable Gate Array (FPGA).
In some embodiments, the processing units in processing subsystem 1204 may execute instructions stored in system memory 1210 or on computer-readable storage media 1222. In various embodiments, the processing unit may execute various programs or code instructions and may maintain multiple concurrently executing programs or processes. At any given time, some or all of the program code to be executed may reside in system memory 1210 and/or on computer-readable storage media 1222, potentially included on one or more storage devices. Through appropriate programming, the processing subsystem 1204 may provide various functions.
In some embodiments, a processing acceleration unit 1206 may be provided to perform customized processing or to offload some of the processing performed by the processing subsystem 1204 in order to accelerate the overall processing performed by the computer system 1200.
I/O subsystem 1208 may include devices and mechanisms for inputting information to computer system 1200 and/or for outputting information from or via computer system 1200. In general, use of the term "input device" is intended to include all possible types of devices and mechanisms for inputting information to computer system 1200. User interface input devices may include, for example, a keyboard, a pointing device such as a mouse or trackball, a touch pad or screen incorporated into the display, a scroll wheel, a click wheel, a dial, buttons, switches, a keypad, an audio input device with voice command recognition system, a microphone, and other types of input devices. The user interface input device may also include a user interface such as Microsoft Windows (R) for enabling a user to control and interact with the input deviceMotion sensing and/or gesture recognition device for a motion sensor, Microsoft360 game controller, a device providing an interface for receiving input using gestures and spoken commands. The user interface input device may also include an eye gesture recognition device, such as to detect eye activity from the user (e.g., "blinks" when taking pictures and/or making menu selections) and translate eye gestures into input devices (e.g., Google)) Input of GoogleA blink detector. In addition, the user interface input devices may include devices that enable a user to interact with a speech recognition system (e.g.,navigator) an interactive voice recognition sensing device.
Other examples of user interface input devices include, but are not limited to, three-dimensional (3D) mice, joysticks or pointing sticks, game pads and graphics tablets, and audio/video devices such as speakers, digital cameras, digital video cameras, portable media players, webcams, image scanners, fingerprint scanners, barcode readers, 3D scanners, 3D printers, laser rangefinders, and eye gaze tracking devices. Further, the user interface input device may comprise, for example, a medical imaging input device, such as a computed tomography, magnetic resonance imaging, positional emission tomography, medical ultrasound examination device. User interface input devices may also include, for example, audio input devices such as MIDI keyboards, digital musical instruments, and the like.
The user interface output devices may include a display subsystem, indicator lights, or a non-visual display such as an audio output device. The display subsystem may be a Cathode Ray Tube (CRT), a flat panel device such as one that utilizes a Liquid Crystal Display (LCD) or a plasma display, a projection device, a touch screen, or the like. In general, use of the term "output device" is intended to include all possible types of devices and mechanisms for outputting information from computer system 1200 to a user or other computer. For example, user interface output devices may include, but are not limited to, various display devices that visually convey text, graphics, and audio/video information, such as monitors, printers, speakers, headphones, car navigation systems, plotters, voice output devices, and modems.
Storage subsystem 1218 provides a repository or data store for storing information used by computer system 1200. Storage subsystem 1218 provides a tangible, non-transitory computer-readable storage medium for storing basic programming and data structures that provide the functionality of some embodiments. Software (programs, code modules, instructions) that when executed by the processing subsystem 1204 provide the above-described functionality may be stored in the storage subsystem 1218. The software may be executed by one or more processing units of the processing subsystem 1204. The storage subsystem 1218 may also provide a repository for storing data used in accordance with the present invention.
The storage subsystem 1218 may include one or more non-transitory memory devices, including volatile and non-volatile memory devices. As shown in fig. 12, the storage subsystem 1218 includes a system memory 1210 and computer-readable storage media 1222. The system memory 1210 may include a number of memories, including a volatile main Random Access Memory (RAM) for storing instructions and data during program execution and a non-volatile Read Only Memory (ROM) or flash memory in which fixed instructions are stored. In some implementations, a basic input/output system (BIOS), containing the basic routines that help to transfer information between elements within computer system 1200, such as during start-up, may be stored in ROM. The RAM typically contains data and/or program modules that are currently being operated on and executed by the processing subsystem 1204. In some implementations, the system memory 1210 may include a plurality of different types of memory, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM).
By way of example, and not limitation, as depicted in FIG. 12, system memory 1210 may store application programs 1212, which may include client applications, Web browsers, middle tier applications, a relational database management system (RDBMS), etc., program data 1214, and operating system 1216. By way of example, the operating system 1216 may include various versions of Microsoft WindowsAppleAnd/or Linux operating system, various commercial productsOr UNIX-like operating systems (including but not limited to various GNU/Linux operating systems, Google)OS, etc.) and/or a compound such as iOS,Phone、OS、8OS anda mobile operating system of the OS operating system.
Computer-readable storage media 1222 may store programming and data structures that provide the functionality of some embodiments. Software (programs, code modules, instructions) that, when executed by the processing subsystem 1204, cause the processor to provide the functionality described above may be stored in the storage subsystem 1218. By way of example, computer-readable storage medium 1222 may include non-volatile memory, such as a hard disk drive, a magnetic disk drive, a hard disk drive such as a CD ROM, DVD, a non-R, a DVD, a non-R, a computer, a CD-R, a CD-ROM, a CD-ROM, a CD-ROM,Optical disc drives for (blu-ray) discs or other optical media. Computer-readable storage media 1222 may include but is not limited to,drives, flash memory cards, Universal Serial Bus (USB) flash drives, Secure Digital (SD) cards, DVD disks, digital video tapes, and the like. The computer-readable storage media 1222 may also include non-volatile memory based Solid State Drives (SSDs), such as flash memory based SSDs, enterprise flash drives, solid state ROMs, etc., volatile memory based SSDs, such as solid state RAM, dynamic RAM, static RAM, DRAM based SSDs, magnetoresistive RAM (mram) SSDs, and hybrid SSDs that use a combination of DRAM based and flash memory based SSDs. Computer-readable media 1222 may provide storage of computer-readable instructions, data structures, program modules, and other data for computer system 1200.
In certain embodiments, the storage subsystem 1200 may also include a computer-readable storage media reader 1220, which may be further connected to a computer-readable storage medium 1222. Optionally, together with system memory 1210 and in combination, computer-readable storage media 1222 may comprehensively represent remote, local, fixed, and/or removable storage devices plus storage media for storing computer-readable information.
In some embodiments, computer system 1200 may provide support for executing one or more virtual machines. Computer system 1200 may execute programs, such as hypervisors, to facilitate configuration and management of virtual machines. Each virtual machine may be allocated memory, compute (e.g., processor, kernel), I/O, and networking resources. Each virtual machine typically runs its own operating system, which may be the same or different from the operating systems executed by other virtual machines executed by computer system 1200. Accordingly, multiple operating systems may potentially be run concurrently by computer system 1200. Each virtual machine typically runs independently of the other virtual machines.
In some embodiments, communications subsystem 1224 may be configured to receive data that may be continuous or unbounded in nature without explicit termination in the form of a continuous data stream, which may include event stream 1228 and/or event updates 1230 of real-time events. Examples of applications that generate continuous data may include, for example, sensor data applications, financial tickers, network performance measurement tools (e.g., network monitoring and traffic management applications), click stream analysis tools, automotive traffic monitoring, and so forth.
The communications subsystem 1224 may also be configured to output structured and/or unstructured data feeds 1226, event streams 1228, event updates 1230, etc. to one or more databases that may be in communication with one or more streaming data source computers coupled to the computer system 1200.
Computer system 1200 may be one of various types, including a hand-portable device (e.g.,a cellular phone,Computing tablet, PDA), wearable device (e.g., Google)Head mounted display), personal computers, workstations, mainframes, kiosks, server racks, or any other data processing system.
Due to the ever-changing nature of computers and networks, the description of computer system 1200 depicted in FIG. 12 is intended only as a specific example. Many other configurations are possible with more or fewer components than the system depicted in fig. 12. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the various embodiments.
While specific embodiments of the invention have been described, various modifications, alterations, alternative constructions, and equivalents are also encompassed within the scope of the invention. The modifications comprise any relevant combination of the disclosed features. Embodiments of the present invention are not limited to operation within certain specific data processing environments, but may be freely operable within multiple data processing environments. Further, although embodiments of the invention have been described with a particular series of transactions and steps, it should be apparent to those skilled in the art that the scope of the invention is not limited to the described series of transactions and steps. Various features and aspects of the above-described embodiments may be used alone or in combination.
In addition, although embodiments of the invention have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are also within the scope of the invention. Embodiments of the present invention may be implemented in hardware only, software only, or a combination thereof. The various processes described herein may be implemented on the same processor or on different processors in any combination. Accordingly, where a component or module is described as being configured to perform certain operations, such configuration may be achieved, for example, by designing electronic circuitry to perform the operations, by programming programmable electronic circuitry (such as a microprocessor) to perform the operations, or any combination thereof. The processes may communicate using a variety of techniques, including but not limited to conventional techniques for inter-process communication, and different pairs of processes may use different techniques, or the same pair of processes may use different techniques at different times.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that additions, subtractions, deletions, and other modifications and changes may be made thereto without departing from the broader spirit and scope as set forth in the claims. Thus, while specific invention embodiments have been described, these embodiments are not intended to be limiting. Various modifications and equivalents are within the scope of the following claims.
Claims (20)
1. A method, comprising:
receiving, by a computing system of an access management system, from a computing device operated by a user, an access request for a resource for which access is managed by the access management system;
determining, by the computing system, that the user is not authenticated to access the resource;
sending, by a computing system, a request for user credentials to a computing device of a user;
receiving, by a computing system from a computing device operated by a user, a validation request to authenticate an access management system, the validation request including user identification information associated with the user;
determining, by the computing system, based on the user identification information, whether the user can request verification to authenticate the access management system;
upon determining that the user can request verification, sending, by the computing system, temporary access information for the user authentication access management system to a destination associated with the user;
receiving, by the computing system, a first response including the temporary access information from the computing device operated by the user;
after verifying the temporary access information received in the first response, sending, by the computing system to the computing device, personal information about the user, wherein the personal information is different from the user identification information;
receiving, by the computing system, a second response from the computing device operated by the user, the second response indicating confirmation of the personal information by the user, and the second response including credential data of the user; and
determining, by the computing system, an authentication of the user to access the resource from the computing device, wherein the authentication is determined based on the confirmation of the credential data and the personal information received in the second response.
2. The method of claim 1, wherein the destination comprises a device associated with a user, and wherein the device is different from the computing device.
3. The method of claim 1, wherein the destination comprises the computing device.
4. The method of claim 1, wherein the temporary access information is associated with one or more constraints that limit use of the temporary access information to a limited period of time.
5. The method of claim 4, further comprising verifying the temporary access information received in the first response based on the temporary access information received in the first response and the one or more constraints.
6. The method of claim 1, wherein the personal information includes recent information associated with a user that may otherwise be inaccessible to an unauthorized user who is not a holder of the user identification information.
7. The method of claim 1, wherein the temporary access information is associated with a time period, wherein verifying the temporary access information comprises determining that a response time is within the time period, and wherein the response time is based on a time at which a first response is received after the temporary access information is sent to a computing device.
8. An access management system, comprising:
one or more processors; and
a memory coupled with and readable by the one or more processors, the memory storing a set of instructions that when executed by the one or more processors cause the one or more processors to:
receiving, from a computing device operated by a user, an access request for a resource for which access is managed by an access management system;
determining that the user is not authenticated to access the resource;
sending a request for user credentials to a computing device of a user;
receiving a verification request from a computing device operated by a user to authenticate the access management system, the verification request including user identification information associated with the user;
determining whether the user can request verification to authenticate the access management system based on the user identification information;
upon determining that the user can request verification, sending temporary access information for the user authentication access management system to a destination associated with the user;
receiving a first response including temporary access information from a user-operated computing device;
after verifying the temporary access information received in the first response, sending personal information about the user to the computing device, wherein the personal information is different from the user identification information;
receiving a second response from the computing device operated by the user, the second response indicating confirmation of the personal information by the user, and the second response including credential data of the user; and
determining an authentication of the user to access the resource from the computing device, wherein the authentication is determined based on the confirmation of the credential data and the personal information received in the second response.
9. The system of claim 8, wherein the destination comprises a device associated with a user, and wherein the device is different from the computing device.
10. The system of claim 8, wherein the destination comprises the computing device.
11. The system of claim 8, wherein the temporary access information is associated with one or more constraints that limit use of the temporary access information to a limited period of time.
12. The system of claim 11, wherein the one or more processors are further caused to verify the temporary access information received in the first response based on the temporary access information received in the first response and the one or more constraints.
13. The system of claim 8, wherein the personal information includes recent information associated with a user that may otherwise be inaccessible to an unauthorized user who is not a holder of the user identification information.
14. The system of claim 8, wherein the temporary access information is associated with a time period, wherein verifying the temporary access information comprises determining that a response time is within the time period, and wherein the response time is based on a time at which a first response is received after the temporary access information is sent to a computing device.
15. A non-transitory computer-readable medium storing a set of instructions that, when executed by one or more processors, cause the one or more processors to:
receiving, from a computing device operated by a user, an access request for a resource for which access is managed by an access management system;
determining that the user is not authenticated to access the resource;
sending a request for user credentials to a destination associated with a user;
receiving a verification request from a computing device operated by a user to authenticate an access management system, the verification request including user identification information associated with the user;
determining whether the user can request verification to authenticate the access management system based on the user identification information;
upon determining that the user can request verification, sending temporary access information for the user authenticated access management system to a computing device operated by the user;
receiving a first response including temporary access information from a user-operated computing device;
after verifying the temporary access information received in the first response, sending personal information about the user to the computing device, wherein the personal information is different from the user identification information;
receiving a second response from the computing device operated by the user, the second response indicating confirmation of the personal information by the user, and the second response including credential data of the user; and
determining an authentication of the user to access the resource from the computing device, wherein the authentication is determined based on the confirmation of the credential data and the personal information received in the second response.
16. The non-transitory computer-readable medium of claim 15, wherein the destination comprises a device associated with a user, and wherein the device is different from the computing device.
17. The non-transitory computer-readable medium of claim 15, wherein the destination comprises the computing device.
18. The non-transitory computer-readable medium of claim 15, wherein the temporary access information is associated with one or more constraints that limit use of the temporary access information to a limited period of time.
19. The non-transitory computer-readable medium of claim 15, wherein the personal information includes recent information associated with a user that may otherwise be inaccessible to an unauthorized user who is not a holder of the user identification information.
20. The non-transitory computer-readable medium of claim 15, wherein the temporary access information is associated with a time period, wherein verifying the temporary access information comprises determining that a response time is within the time period, and wherein the response time is based on a time at which a first response is received after the temporary access information is sent to a computing device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210366031.3A CN114726621B (en) | 2015-10-22 | 2016-03-31 | Method and system for end user initiated access server authenticity checking |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/920,807 US10164971B2 (en) | 2015-10-22 | 2015-10-22 | End user initiated access server authenticity check |
US14/920,807 | 2015-10-22 | ||
CN202210366031.3A CN114726621B (en) | 2015-10-22 | 2016-03-31 | Method and system for end user initiated access server authenticity checking |
CN201680061463.6A CN108351933B (en) | 2015-10-22 | 2016-03-31 | Method and system for end-user initiated access server plausibility check |
PCT/US2016/025402 WO2017069800A1 (en) | 2015-10-22 | 2016-03-31 | End user initiated access server authenticity check |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680061463.6A Division CN108351933B (en) | 2015-10-22 | 2016-03-31 | Method and system for end-user initiated access server plausibility check |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114726621A true CN114726621A (en) | 2022-07-08 |
CN114726621B CN114726621B (en) | 2024-05-24 |
Family
ID=55809176
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210366031.3A Active CN114726621B (en) | 2015-10-22 | 2016-03-31 | Method and system for end user initiated access server authenticity checking |
CN201680061463.6A Active CN108351933B (en) | 2015-10-22 | 2016-03-31 | Method and system for end-user initiated access server plausibility check |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680061463.6A Active CN108351933B (en) | 2015-10-22 | 2016-03-31 | Method and system for end-user initiated access server plausibility check |
Country Status (5)
Country | Link |
---|---|
US (2) | US10164971B2 (en) |
EP (1) | EP3365827B1 (en) |
JP (1) | JP6707127B2 (en) |
CN (2) | CN114726621B (en) |
WO (1) | WO2017069800A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114915500A (en) * | 2022-07-15 | 2022-08-16 | 北京热源汇盈网络科技有限公司 | Self-media account management method and device based on PC desktop client |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10250594B2 (en) | 2015-03-27 | 2019-04-02 | Oracle International Corporation | Declarative techniques for transaction-specific authentication |
US10387980B1 (en) * | 2015-06-05 | 2019-08-20 | Acceptto Corporation | Method and system for consumer based access control for identity information |
US10164971B2 (en) | 2015-10-22 | 2018-12-25 | Oracle International Corporation | End user initiated access server authenticity check |
US10225283B2 (en) | 2015-10-22 | 2019-03-05 | Oracle International Corporation | Protection against end user account locking denial of service (DOS) |
US10257205B2 (en) | 2015-10-22 | 2019-04-09 | Oracle International Corporation | Techniques for authentication level step-down |
CN108351927B (en) | 2015-10-23 | 2021-11-09 | 甲骨文国际公司 | Password-free authentication for access management |
US10303865B2 (en) * | 2016-08-31 | 2019-05-28 | Redrock Biometrics, Inc. | Blue/violet light touchless palm print identification |
US20180270215A1 (en) * | 2017-03-16 | 2018-09-20 | Ca, Inc. | Personal assurance message over sms and email to prevent phishing attacks |
US10645079B2 (en) | 2017-05-12 | 2020-05-05 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using authentication tokens and multi-device authentication prompts |
IL253632B (en) * | 2017-07-24 | 2022-01-01 | Sensepass Ltd | System and method for distance based secured communication over an unsecure communication channel |
EP3594843A1 (en) * | 2018-07-10 | 2020-01-15 | Klaxoon | Improved scalable architecture of servers providing access to data content |
US11188913B2 (en) * | 2019-01-11 | 2021-11-30 | Capital One Services, Llc | Systems and methods for securely verifying a subset of personally identifiable information |
US11189119B2 (en) * | 2019-07-19 | 2021-11-30 | Carrier Corporation | Method and system for access systems |
US10706704B1 (en) * | 2019-07-25 | 2020-07-07 | Bank Of America Corporation | Utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities |
US11244069B2 (en) * | 2019-08-26 | 2022-02-08 | International Business Machines Corporation | Controlling combination of information submitted to computing systems |
US11182995B1 (en) * | 2019-11-25 | 2021-11-23 | Wells Fargo Bank, N.A. | Systems and methods for remotely accessing secured spaces |
US11582220B2 (en) * | 2020-03-31 | 2023-02-14 | Konica Minolta Business Solutions U.S.A., Inc. | Authentication server and method that allow user to log into application or service provided via client devices |
US11971980B2 (en) * | 2020-05-28 | 2024-04-30 | Red Hat, Inc. | Using trusted execution environments to perform a communal operation for mutually-untrusted devices |
US12093371B2 (en) | 2020-05-28 | 2024-09-17 | Red Hat, Inc. | Data distribution using a trusted execution environment in an untrusted device |
US11947659B2 (en) | 2020-05-28 | 2024-04-02 | Red Hat, Inc. | Data distribution across multiple devices using a trusted execution environment in a mobile device |
US11848924B2 (en) * | 2020-10-12 | 2023-12-19 | Red Hat, Inc. | Multi-factor system-to-system authentication using secure execution environments |
US11783065B2 (en) | 2020-11-25 | 2023-10-10 | International Business Machines Corporation | Business data protection for running tasks in computer system |
JP7507186B2 (en) | 2022-02-08 | 2024-06-27 | エイチ・シー・ネットワークス株式会社 | How to handle network systems and single sign-on |
US12120122B2 (en) * | 2022-07-20 | 2024-10-15 | Nvidia Corporation | Processing authentication requests for unified access management systems and applications |
US12120152B2 (en) | 2022-07-20 | 2024-10-15 | Nvidia Corporation | Preemptive processing of authentication requests for unified access management systems and applications |
US20240080313A1 (en) * | 2022-09-02 | 2024-03-07 | Cisco Technology, Inc. | Authentication (authn) and authorization (authz) binding for secure network access |
US20240152598A1 (en) * | 2022-11-09 | 2024-05-09 | Jpmorgan Chase Bank, N.A. | System, method, and computer program for smart secret rotator |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070136573A1 (en) * | 2005-12-05 | 2007-06-14 | Joseph Steinberg | System and method of using two or more multi-factor authentication mechanisms to authenticate online parties |
US20070199053A1 (en) * | 2006-02-13 | 2007-08-23 | Tricipher, Inc. | Flexible and adjustable authentication in cyberspace |
US20110246235A1 (en) * | 2010-03-31 | 2011-10-06 | Airstrip Ip Holdings, Llc | Multi-factor authentication for remote access of patient data |
CN103366111A (en) * | 2013-07-10 | 2013-10-23 | 公安部第三研究所 | Two-dimensional code based method for realizing extended authentication control of smart card on mobile equipment |
CN103563294A (en) * | 2011-06-30 | 2014-02-05 | 国际商业机器公司 | Authentication and authorization methods for cloud computing platform security |
US20140214688A1 (en) * | 2011-08-31 | 2014-07-31 | Ping Identity Corporation | System and method for secure transaction process via mobile device |
Family Cites Families (126)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5636280A (en) | 1994-10-31 | 1997-06-03 | Kelly; Tadhg | Dual key reflexive encryption security system |
US6412077B1 (en) | 1999-01-14 | 2002-06-25 | Cisco Technology, Inc. | Disconnect policy for distributed computing systems |
US6892307B1 (en) | 1999-08-05 | 2005-05-10 | Sun Microsystems, Inc. | Single sign-on framework with trust-level mapping to authentication requirements |
US6609198B1 (en) | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US6950949B1 (en) | 1999-10-08 | 2005-09-27 | Entrust Limited | Method and apparatus for password entry using dynamic interface legitimacy information |
JP2001117873A (en) * | 1999-10-19 | 2001-04-27 | Hitachi Ltd | Method for identifying terminal |
US6246769B1 (en) | 2000-02-24 | 2001-06-12 | Michael L. Kohut | Authorized user verification by sequential pattern recognition and access code acquisition |
US7086085B1 (en) | 2000-04-11 | 2006-08-01 | Bruce E Brown | Variable trust levels for authentication |
JP3855595B2 (en) | 2000-04-25 | 2006-12-13 | 株式会社日立製作所 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMMUNICATION DEVICE |
US7590684B2 (en) | 2001-07-06 | 2009-09-15 | Check Point Software Technologies, Inc. | System providing methodology for access control with cooperative enforcement |
GB0119629D0 (en) | 2001-08-10 | 2001-10-03 | Cryptomathic As | Data certification method and apparatus |
US7076797B2 (en) | 2001-10-05 | 2006-07-11 | Microsoft Corporation | Granular authorization for network user sessions |
US7562222B2 (en) | 2002-05-10 | 2009-07-14 | Rsa Security Inc. | System and method for authenticating entities to users |
ATE291321T1 (en) | 2002-12-20 | 2005-04-15 | Cit Alcatel | METHOD AND DEVICE FOR AUTHENTICATING A USER |
JP2004198872A (en) | 2002-12-20 | 2004-07-15 | Sony Electronics Inc | Terminal device and server |
US7283048B2 (en) | 2003-02-03 | 2007-10-16 | Ingrid, Inc. | Multi-level meshed security network |
US20040215750A1 (en) | 2003-04-28 | 2004-10-28 | Stilp Louis A. | Configuration program for a security system |
WO2004111940A1 (en) | 2003-06-16 | 2004-12-23 | Yokohama Tlo Co., Ltd. | Personal identification device and system having personal identification device |
US7395424B2 (en) | 2003-07-17 | 2008-07-01 | International Business Machines Corporation | Method and system for stepping up to certificate-based authentication without breaking an existing SSL session |
US7724700B1 (en) | 2003-08-25 | 2010-05-25 | Cisco Technology, Inc. | Application server-centric quality of service management in network communications |
US8128474B2 (en) | 2004-03-05 | 2012-03-06 | Cantor Index, Llc | Computer graphics processing methods and systems for presentation of graphics objects or text in a wagering environment |
JP4160092B2 (en) | 2004-03-09 | 2008-10-01 | ケイティーフリーテル カンパニー リミテッド | Packet data charging subdivision method and system |
JP2006311529A (en) * | 2005-03-30 | 2006-11-09 | Seiko Epson Corp | Authentication system and authentication method therefor, authentication server and authentication method therefor, recording medium, and program |
US7574212B2 (en) | 2005-06-22 | 2009-08-11 | Sprint Spectrum L.P. | Method and system for managing communication sessions during multi-mode mobile station handoff |
US20070037552A1 (en) * | 2005-08-11 | 2007-02-15 | Timothy Lee | Method and system for performing two factor mutual authentication |
EP1922632B1 (en) | 2005-08-11 | 2014-05-07 | SanDisk IL Ltd. | Extended one-time password method and apparatus |
US20070125840A1 (en) | 2005-12-06 | 2007-06-07 | Boncle, Inc. | Extended electronic wallet management |
US20070130463A1 (en) | 2005-12-06 | 2007-06-07 | Eric Chun Wah Law | Single one-time password token with single PIN for access to multiple providers |
US7904946B1 (en) | 2005-12-09 | 2011-03-08 | Citicorp Development Center, Inc. | Methods and systems for secure user authentication |
US20070174429A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US20070200597A1 (en) * | 2006-02-28 | 2007-08-30 | Oakland Steven F | Clock generator having improved deskewer |
JP4693171B2 (en) * | 2006-03-17 | 2011-06-01 | 株式会社日立ソリューションズ | Authentication system |
US8010996B2 (en) | 2006-07-17 | 2011-08-30 | Yahoo! Inc. | Authentication seal for online applications |
US8671444B2 (en) | 2006-10-06 | 2014-03-11 | Fmr Llc | Single-party, secure multi-channel authentication for access to a resource |
US20080120507A1 (en) * | 2006-11-21 | 2008-05-22 | Shakkarwar Rajesh G | Methods and systems for authentication of a user |
US8156536B2 (en) | 2006-12-01 | 2012-04-10 | Cisco Technology, Inc. | Establishing secure communication sessions in a communication network |
US8032922B2 (en) | 2006-12-18 | 2011-10-04 | Oracle International Corporation | Method and apparatus for providing access to an application-resource |
US20100146263A1 (en) | 2007-06-20 | 2010-06-10 | Mchek India Payment Systems Pvt. Ltd. | Method and system for secure authentication |
US9009327B2 (en) | 2007-08-03 | 2015-04-14 | Citrix Systems, Inc. | Systems and methods for providing IIP address stickiness in an SSL VPN session failover environment |
US8122251B2 (en) | 2007-09-19 | 2012-02-21 | Alcatel Lucent | Method and apparatus for preventing phishing attacks |
US8209209B2 (en) | 2007-10-02 | 2012-06-26 | Incontact, Inc. | Providing work, training, and incentives to company representatives in contact handling systems |
US8302167B2 (en) | 2008-03-11 | 2012-10-30 | Vasco Data Security, Inc. | Strong authentication token generating one-time passwords and signatures upon server credential verification |
KR101496329B1 (en) | 2008-03-28 | 2015-02-26 | 삼성전자주식회사 | Method and appratus for handiling security of a device on network |
US8584196B2 (en) | 2008-05-05 | 2013-11-12 | Oracle International Corporation | Technique for efficiently evaluating a security policy |
US8006291B2 (en) | 2008-05-13 | 2011-08-23 | Veritrix, Inc. | Multi-channel multi-factor authentication |
US8339954B2 (en) | 2008-05-16 | 2012-12-25 | Cisco Technology, Inc. | Providing trigger based traffic management |
US8141140B2 (en) | 2008-05-23 | 2012-03-20 | Hsbc Technologies Inc. | Methods and systems for single sign on with dynamic authentication levels |
US7523309B1 (en) | 2008-06-27 | 2009-04-21 | International Business Machines Corporation | Method of restricting access to emails by requiring multiple levels of user authentication |
US8738488B2 (en) * | 2008-08-12 | 2014-05-27 | Branch Banking & Trust Company | Method for business on-line account opening with early warning system |
US8327422B1 (en) | 2008-09-26 | 2012-12-04 | Emc Corporation | Authenticating a server device using dynamically generated representations |
US8893243B2 (en) * | 2008-11-10 | 2014-11-18 | Sms Passcode A/S | Method and system protecting against identity theft or replication abuse |
US8281379B2 (en) | 2008-11-13 | 2012-10-02 | Vasco Data Security, Inc. | Method and system for providing a federated authentication service with gradual expiration of credentials |
US8843997B1 (en) | 2009-01-02 | 2014-09-23 | Resilient Network Systems, Inc. | Resilient trust network services |
NO332479B1 (en) | 2009-03-02 | 2012-09-24 | Encap As | Procedure and computer program for verifying one-time password between server and mobile device using multiple channels |
US8863270B2 (en) | 2009-05-22 | 2014-10-14 | Raytheon Company | User interface for providing voice communications over a multi-level secure network |
US9130903B2 (en) | 2009-07-01 | 2015-09-08 | Citrix Systems, Inc. | Unified out of band management system for desktop and server sessions |
US8453224B2 (en) | 2009-10-23 | 2013-05-28 | Novell, Inc. | Single sign-on authentication |
US8490165B2 (en) | 2010-06-23 | 2013-07-16 | International Business Machines Corporation | Restoring secure sessions |
US8572268B2 (en) | 2010-06-23 | 2013-10-29 | International Business Machines Corporation | Managing secure sessions |
US8312519B1 (en) | 2010-09-30 | 2012-11-13 | Daniel V Bailey | Agile OTP generation |
CN102457484A (en) * | 2010-10-26 | 2012-05-16 | 镇江精英软件科技有限公司 | Method for checking user information by combining user name/password authentication and check code |
US8555355B2 (en) * | 2010-12-07 | 2013-10-08 | Verizon Patent And Licensing Inc. | Mobile pin pad |
US8806591B2 (en) | 2011-01-07 | 2014-08-12 | Verizon Patent And Licensing Inc. | Authentication risk evaluation |
WO2012095854A1 (en) | 2011-01-13 | 2012-07-19 | Infosys Technologies Limited | System and method for accessing integrated applications in a single sign-on enabled enterprise solution |
US8549145B2 (en) | 2011-02-08 | 2013-10-01 | Aventura Hq, Inc. | Pre-access location-based rule initiation in a virtual computing environment |
US8640214B2 (en) | 2011-03-07 | 2014-01-28 | Gemalto Sa | Key distribution for unconnected one-time password tokens |
US8763097B2 (en) | 2011-03-11 | 2014-06-24 | Piyush Bhatnagar | System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication |
WO2012156785A1 (en) | 2011-05-13 | 2012-11-22 | Shenoy Gurudatt | Systems and methods for device based password-less user authentication using encryption |
US8856893B2 (en) | 2011-06-09 | 2014-10-07 | Hao Min | System and method for an ATM electronic lock system |
US8677464B2 (en) | 2011-06-22 | 2014-03-18 | Schweitzer Engineering Laboratories Inc. | Systems and methods for managing secure communication sessions with remote devices |
US8627438B1 (en) | 2011-09-08 | 2014-01-07 | Amazon Technologies, Inc. | Passwordless strong authentication using trusted devices |
US8943320B2 (en) | 2011-10-31 | 2015-01-27 | Novell, Inc. | Techniques for authentication via a mobile device |
US8954758B2 (en) | 2011-12-20 | 2015-02-10 | Nicolas LEOUTSARAKOS | Password-less security and protection of online digital assets |
US9438575B2 (en) | 2011-12-22 | 2016-09-06 | Paypal, Inc. | Smart phone login using QR code |
US9380026B2 (en) | 2011-12-27 | 2016-06-28 | Intel Corporation | Authenticating to a network via a device-specific one time password |
KR101236544B1 (en) | 2012-01-12 | 2013-03-15 | 주식회사 엘지씨엔에스 | Payment method and payment gateway, mobile terminal and time certificate issuing server associated with the same |
US10120847B2 (en) | 2012-01-27 | 2018-11-06 | Usablenet Inc. | Methods for transforming requests for web content and devices thereof |
US20130205373A1 (en) | 2012-02-08 | 2013-08-08 | Aventura Hq, Inc. | Adapting authentication flow based on workflow events |
US8898765B2 (en) | 2012-02-15 | 2014-11-25 | Oracle International Corporation | Signing off from multiple domains accessible using single sign-on |
US8935777B2 (en) | 2012-02-17 | 2015-01-13 | Ebay Inc. | Login using QR code |
US8578476B2 (en) | 2012-03-23 | 2013-11-05 | Ca, Inc. | System and method for risk assessment of login transactions through password analysis |
US8856892B2 (en) | 2012-06-27 | 2014-10-07 | Sap Ag | Interactive authentication |
CN103532919B (en) | 2012-07-06 | 2018-06-12 | 腾讯科技(深圳)有限公司 | User account keeps logging in the method and system of state |
US20140047233A1 (en) | 2012-08-07 | 2014-02-13 | Jeffrey T. Kalin | System and methods for automated transaction key generation and authentication |
US9554389B2 (en) | 2012-08-31 | 2017-01-24 | Qualcomm Incorporated | Selectively allocating quality of service to support multiple concurrent sessions for a client device |
GB2505710A (en) | 2012-09-11 | 2014-03-12 | Barclays Bank Plc | Registration method and system for secure online banking |
US9083691B2 (en) | 2012-09-14 | 2015-07-14 | Oracle International Corporation | Fine-grained user authentication and activity tracking |
US9092607B2 (en) | 2012-10-01 | 2015-07-28 | Oracle International Corporation | Dynamic flow control for access managers |
US9218476B1 (en) | 2012-11-07 | 2015-12-22 | Amazon Technologies, Inc. | Token based one-time password security |
US8625796B1 (en) | 2012-11-30 | 2014-01-07 | Mourad Ben Ayed | Method for facilitating authentication using proximity |
EP2743857A1 (en) | 2012-12-13 | 2014-06-18 | Gemalto SA | Methof for allowing establishment of a secure session between a device and a server |
US8966591B2 (en) | 2013-01-18 | 2015-02-24 | Ca, Inc. | Adaptive strike count policy |
US20140279445A1 (en) | 2013-03-18 | 2014-09-18 | Tencent Technology (Shenzhen) Company Limited | Method, Apparatus, and System for Processing Transactions |
CN103220280A (en) | 2013-04-03 | 2013-07-24 | 天地融科技股份有限公司 | Dynamic password token and data transmission method and system for dynamic password token |
US9569472B2 (en) | 2013-06-06 | 2017-02-14 | Oracle International Corporation | System and method for providing a second level connection cache for use with a database environment |
GB2515289A (en) * | 2013-06-17 | 2014-12-24 | Mastercard International Inc | Display card with user interface |
EP2821972B1 (en) | 2013-07-05 | 2020-04-08 | Assa Abloy Ab | Key device and associated method, computer program and computer program product |
US9674168B2 (en) | 2013-09-19 | 2017-06-06 | Oracle International Corporation | Privileged account plug-in framework-step-up validation |
US9544293B2 (en) | 2013-09-20 | 2017-01-10 | Oracle International Corporation | Global unified session identifier across multiple data centers |
US9866640B2 (en) | 2013-09-20 | 2018-01-09 | Oracle International Corporation | Cookie based session management |
US9742757B2 (en) | 2013-11-27 | 2017-08-22 | International Business Machines Corporation | Identifying and destroying potentially misappropriated access tokens |
US9202035B1 (en) | 2013-12-18 | 2015-12-01 | Emc Corporation | User authentication based on biometric handwriting aspects of a handwritten code |
CN103716326B (en) * | 2013-12-31 | 2017-02-01 | 华为技术有限公司 | Resource access method and URG |
US10212143B2 (en) | 2014-01-31 | 2019-02-19 | Dropbox, Inc. | Authorizing an untrusted client device for access on a content management system |
US9537661B2 (en) | 2014-02-28 | 2017-01-03 | Verizon Patent And Licensing Inc. | Password-less authentication service |
US9560076B2 (en) | 2014-03-19 | 2017-01-31 | Verizon Patent And Licensing Inc. | Secure trust-scored distributed multimedia collaboration session |
US10079826B2 (en) | 2014-03-19 | 2018-09-18 | BluInk Ltd. | Methods and systems for data entry |
US10136315B2 (en) | 2014-04-17 | 2018-11-20 | Guang Gong | Password-less authentication system, method and device |
US11030587B2 (en) * | 2014-04-30 | 2021-06-08 | Mastercard International Incorporated | Systems and methods for providing anonymized transaction data to third-parties |
US10270780B2 (en) | 2014-08-18 | 2019-04-23 | Dropbox, Inc. | Access management using electronic images |
GB2529632A (en) | 2014-08-26 | 2016-03-02 | Ibm | Authentication management |
US9495522B2 (en) | 2014-09-03 | 2016-11-15 | Microsoft Technology Licensing, Llc | Shared session techniques |
CN104660412A (en) | 2014-10-22 | 2015-05-27 | 南京泽本信息技术有限公司 | Password-less security authentication method and system for mobile equipment |
CN104468119B (en) * | 2014-11-21 | 2017-06-27 | 上海瀚之友信息技术服务有限公司 | A kind of disposal password Verification System and authentication method |
US10547599B1 (en) | 2015-02-19 | 2020-01-28 | Amazon Technologies, Inc. | Multi-factor authentication for managed directories |
CN107409126B (en) | 2015-02-24 | 2021-03-09 | 思科技术公司 | System and method for securing an enterprise computing environment |
EP3065366B1 (en) | 2015-03-02 | 2020-09-09 | Bjoern Pirrwitz | Identification and/or authentication system and method |
US10250594B2 (en) | 2015-03-27 | 2019-04-02 | Oracle International Corporation | Declarative techniques for transaction-specific authentication |
US9769147B2 (en) | 2015-06-29 | 2017-09-19 | Oracle International Corporation | Session activity tracking for session adoption across multiple data centers |
US10693859B2 (en) | 2015-07-30 | 2020-06-23 | Oracle International Corporation | Restricting access for a single sign-on (SSO) session |
SG10201508081TA (en) * | 2015-09-29 | 2017-04-27 | Mastercard International Inc | Method and system for dynamic pin authorisation for atm or pos transactions |
US10225283B2 (en) | 2015-10-22 | 2019-03-05 | Oracle International Corporation | Protection against end user account locking denial of service (DOS) |
US10164971B2 (en) | 2015-10-22 | 2018-12-25 | Oracle International Corporation | End user initiated access server authenticity check |
US10257205B2 (en) | 2015-10-22 | 2019-04-09 | Oracle International Corporation | Techniques for authentication level step-down |
CN108351927B (en) | 2015-10-23 | 2021-11-09 | 甲骨文国际公司 | Password-free authentication for access management |
US10038787B2 (en) | 2016-05-06 | 2018-07-31 | Genesys Telecommunications Laboratories, Inc. | System and method for managing and transitioning automated chat conversations |
-
2015
- 2015-10-22 US US14/920,807 patent/US10164971B2/en active Active
-
2016
- 2016-03-31 EP EP16718753.3A patent/EP3365827B1/en active Active
- 2016-03-31 JP JP2018520614A patent/JP6707127B2/en active Active
- 2016-03-31 WO PCT/US2016/025402 patent/WO2017069800A1/en active Application Filing
- 2016-03-31 CN CN202210366031.3A patent/CN114726621B/en active Active
- 2016-03-31 CN CN201680061463.6A patent/CN108351933B/en active Active
-
2018
- 2018-11-15 US US16/191,955 patent/US10666643B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070136573A1 (en) * | 2005-12-05 | 2007-06-14 | Joseph Steinberg | System and method of using two or more multi-factor authentication mechanisms to authenticate online parties |
US20070199053A1 (en) * | 2006-02-13 | 2007-08-23 | Tricipher, Inc. | Flexible and adjustable authentication in cyberspace |
US20110246235A1 (en) * | 2010-03-31 | 2011-10-06 | Airstrip Ip Holdings, Llc | Multi-factor authentication for remote access of patient data |
CN103563294A (en) * | 2011-06-30 | 2014-02-05 | 国际商业机器公司 | Authentication and authorization methods for cloud computing platform security |
US20140214688A1 (en) * | 2011-08-31 | 2014-07-31 | Ping Identity Corporation | System and method for secure transaction process via mobile device |
CN103366111A (en) * | 2013-07-10 | 2013-10-23 | 公安部第三研究所 | Two-dimensional code based method for realizing extended authentication control of smart card on mobile equipment |
Non-Patent Citations (2)
Title |
---|
OMAR ELKEELANY, VIVEKANAND S. TODAKAR: "Data concentration and archival to SD card via hardware description language", IEEE, 1 March 2012 (2012-03-01), pages 1 - 6 * |
马丁等: "一种基于临时证书的互联网实名认证方案", 信息安全与通信保密, 15 December 2013 (2013-12-15), pages 92 - 95 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114915500A (en) * | 2022-07-15 | 2022-08-16 | 北京热源汇盈网络科技有限公司 | Self-media account management method and device based on PC desktop client |
CN114915500B (en) * | 2022-07-15 | 2022-10-14 | 北京热源汇盈网络科技有限公司 | Self-media account management method and device based on PC desktop client |
Also Published As
Publication number | Publication date |
---|---|
WO2017069800A1 (en) | 2017-04-27 |
CN108351933A (en) | 2018-07-31 |
JP6707127B2 (en) | 2020-06-10 |
EP3365827B1 (en) | 2019-09-18 |
US10164971B2 (en) | 2018-12-25 |
EP3365827A1 (en) | 2018-08-29 |
CN114726621B (en) | 2024-05-24 |
JP2018533141A (en) | 2018-11-08 |
US20170118202A1 (en) | 2017-04-27 |
US10666643B2 (en) | 2020-05-26 |
US20190089698A1 (en) | 2019-03-21 |
CN108351933B (en) | 2022-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10666643B2 (en) | End user initiated access server authenticity check | |
US10735196B2 (en) | Password-less authentication for access management | |
US10805383B2 (en) | Access management in a data storage system | |
US10257205B2 (en) | Techniques for authentication level step-down | |
US10462142B2 (en) | Techniques for implementing a data storage device as a security device for managing access to resources | |
US10157275B1 (en) | Techniques for access management based on multi-factor authentication including knowledge-based authentication | |
US10454936B2 (en) | Access manager session management strategy | |
US11290438B2 (en) | Managing session access across multiple data centers | |
US10693859B2 (en) | Restricting access for a single sign-on (SSO) session | |
US10225283B2 (en) | Protection against end user account locking denial of service (DOS) | |
US10581826B2 (en) | Run-time trust management system for access impersonation | |
US20180046794A1 (en) | Session activity tracking for session adoption across multiple data centers | |
CN113728603B (en) | Method for logging in to a session by means of a browser with non-extractable asymmetric keys |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |